Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras

Deep learning simplified by taking supervised, unsupervised, and reinforcement learning to the next level using the Python ecosystem

Key Features

  • Build deep learning models with transfer learning principles in Python
  • implement transfer learning to solve real-world research...
Python Artificial Intelligence Projects for Beginners: Get up and running with Artificial Intelligence using 8 smart and exciting AI applications
Python Artificial Intelligence Projects for Beginners: Get up and running with Artificial Intelligence using 8 smart and exciting AI applications

Build smart applications by implementing real-world artificial intelligence projects

Key Features

  • Explore a variety of AI projects with Python
  • Get well-versed with different types of neural networks and popular deep learning algorithms
  • Leverage popular...
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Does the gunshot residue reveal how far from the target a weapon was fired? Is there any trace evidence to prove the accused handled a specific firearm? What is the likely behaviour of a ricocheting bullet? Do the marks on a bullet prove categorically that it was fired from a particular weapon? These are all issues (amongst others) that the fully...
Bioinformatics: Problem Solving Paradigms
Bioinformatics: Problem Solving Paradigms
There are fundamental principles for problem analysis and algorithm design that are continuously used in bioinformatics. This book concentrates on a clear presentation of these principles, presenting them in a self-contained, mathematically clear and precise manner, and illustrating them with lots of case studies from main fields of bioinformatics...
Psychoanalysis and Neuroscience
Psychoanalysis and Neuroscience

Recent scientific studies have brought significant advances in the understanding of basic mental functions such as memory, dreams, identification, repression, which constitute the basis of the psychoanalytical theory. This book focuses on the possibility of interactions between psychoanalysis and neuroscience: emotions and the right...

Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
RFID Toys: Cool Projects for Home, Office and Entertainment (ExtremeTech)
RFID Toys: Cool Projects for Home, Office and Entertainment (ExtremeTech)

Radio frequency identification now belongs to the masses, and it lets you control all sorts of things. Like access to your front door. Or valuables in an RFID-enabled safe. You can corral your stuff within an RFID-monitored perimeter, or build a shelf that tells you when you're out of hot sauce. This book shows you how, with step-by-step...

FSM-based Digital Design using Verilog HDL
FSM-based Digital Design using Verilog HDL

As digital circuit elements decrease in physical size, resulting in increasingly complex systems, a basic logic model that can be used in the control and design of a range of semiconductor devices is vital. Finite State Machines (FSM) have numerous advantages; they can be applied to many areas (including motor control, and signal and serial...

Robot Vision: Strategies, Algorithms and Motion Planning
Robot Vision: Strategies, Algorithms and Motion Planning

The field of robot vision guidance is developing rapidly. The benefits of sophisticated vision technology include savings, improved quality, reliability, safety and productivity. Robot vision is used for part identification and navigation. Vision applications generally deal with finding a part and orienting it for robotic handling or...

Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML
Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML

Bring magic to your mobile apps using TensorFlow Lite and Core ML

Key Features

  • Explore machine learning using classification, analytics, and detection tasks.
  • Work with image, text and video datasets to delve into real-world tasks
  • Build apps for Android and...
Result Page: 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy