Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On GPU Programming with Python and CUDA: Explore high-performance parallel computing with CUDA
Hands-On GPU Programming with Python and CUDA: Explore high-performance parallel computing with CUDA

Build GPU-accelerated high performing applications with Python 2.7, CUDA 9, and open source libraries such as PyCUDA and scikit-cuda. We recommend the use of Python 2.7 as this version has stable support across all libraries used in this book.

Key Features

  • Get to grips with GPU programming...
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Quantum Computing
Quantum Computing

The twentieth century witnessed the birth of revolutionary ideas in the phys- ical sciences. These ideas began to shake the traditional view of the universe dating back to the days of Newton, even to the days of Galileo. Albert Ein- stein is usually identified as the creator of the relativity theory, a theory that is used to model the...

CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Plan Your Own Estate: Passing on Your Assets and Your Values Legally and Efficiently
Plan Your Own Estate: Passing on Your Assets and Your Values Legally and Efficiently

Plan Your Own Estate: Passing on Your Assets and Your Values Legally and Efficiently takes a straightforward and engaging “you”-oriented approach to dealing with one of life’s certainties--death. While you "can’t take it with you," this book empowers you to decide how your assets...

Physics For Dummies (Math & Science)
Physics For Dummies (Math & Science)
Does just thinking about the laws of motion make your head spin? Does studying electricity short your circuits? Do the complexities of thermodynamics cool your enthusiasm?

Thanks to this book, you don’t have to be Einstein to understand physics. As you read about Newton’s Laws, Kepler’s Laws, Hooke’s Law, Ohm’s...

Complete Electronics Self-Teaching Guide with Projects
Complete Electronics Self-Teaching Guide with Projects

An all-in-one resource on everything electronics-related! For almost 30 years, this book has been a classic text for electronics enthusiasts. Now completely updated for today's technology, this latest version combines concepts, self-tests, and hands-on projects to offer you a completely repackaged and revised resource. This unique...

Real World ASP.NET: Building a Content Management System
Real World ASP.NET: Building a Content Management System
Aimed at aspiring .NET developers who want to work with content management (CM) applications, Real-World ASP.NET: Building a Content Management System provides a fine overview of what's involved in managing Web site content and also delivers working code for a free, proprietary CMS using the latest in .NET technology and C#.

With...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

Result Page: 57 56 55 54 53 52 51 50 49 48 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy