Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics

Key Features

  • This easy-to-follow guide takes you through every step of the data wrangling process in the best possible way
  • Work with different types of datasets, and reshape the layout of your data to make it easier for analysis
  • Get simple examples and real-life data...
Get Programming with JavaScript
Get Programming with JavaScript

Summary

Get Programming with JavaScript is a hands-on introduction to programming for readers who have never programmed. You'll be writing your own web apps, games, and programs in no time! Foreword by Remy Sharp.

Purchase of the print book includes a free eBook in PDF,...

Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook

Key Features

  • Build highly efficient distributed applications with ease
  • Enhance your cross-platform network programming skills with one of the most reputable C++ libraries
  • Find solutions to real-world problems related to network programming with ready-to-use recipes using this...
Sampling Algorithms (Springer Series in Statistics)
Sampling Algorithms (Springer Series in Statistics)
This book is based upon courses on sampling algorithms. After having used scattered notes for several years, I have decided to completely rewrite the material in a consistent way. The books of Brewer and Hanif (1983) and H´ajek (1981) have been my works of reference. Brewer and Hanif (1983) have drawn up an...
Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

Learning DevOps: Continuously Deliver Better Software
Learning DevOps: Continuously Deliver Better Software

Learn to use some of the most exciting and powerful tools to deliver world-class quality software with continuous delivery and DevOps

About This Book

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • ...
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
The easy way for kids to get started with video game design

Is your youngster a designer at heart? Read on! Designing Digital Games helps children apply their design skills to video game design using Scratch—and this book! Introducing simple programming concepts over the course of three easy-to-follow projects,...

Eigenstructure Control Algorithms: Applications to aircraft/rotorcraft handling qualities design (Control, Robotics and Sensors)
Eigenstructure Control Algorithms: Applications to aircraft/rotorcraft handling qualities design (Control, Robotics and Sensors)

Eigenstructure control involves modification of both the eigenvalues and eigenvectors of a system using feedback. Based on this key concept, algorithms are derived for the design of control systems using controller structures such as state feedback, output feedback, observer-based dynamic feedback, implicit and explicit...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Fusion 360 for Makers: Design Your Own Digital Models for 3D Printing and CNC Fabrication
Fusion 360 for Makers: Design Your Own Digital Models for 3D Printing and CNC Fabrication

Learn how to use Autodesk Fusion 360 to digitally model your own original projects for a 3D printer or a CNC device. Fusion 360 software lets you design, analyze, and print your ideas. Free to students and small businesses alike, it offers solid, surface, organic, direct, and parametric modeling capabilities.

...

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Result Page: 189 188 187 186 185 184 183 182 181 180 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy