Machine Learning and Security: Protecting Systems with Data and Algorithms
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...
CoreOS in Action: Running Applications on Container Linux
CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
The Vietnam War: The Definitive Illustrated History
Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.
Honoring those who served in the war at home or abroad,...
Extending jQuery teaches you to build custom extensions to the jQuery library. It covers all the extension points within jQuery and provides guidelines and techniques on how to make use of them. You'll not only discover how to write plugins, but how to design them for maximum reuse. You'll...
Write smarter, bug-free, high performance code with minimal effort
Uncover the best tools and options available to Python developers today
Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively
MongoDB in Action: Covers MongoDB version 3.0
MongoDB in Action, Second Edition is a completely revised and updated version. It introduces MongoDB 3.0 and the document-oriented database model. This perfectly paced book gives you both the big picture you'll need as a developer and enough low-level detail to satisfy system engineers....
Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...
|Result Page: 134 133 132 131 130 129 128 127 126 125 |