When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Overview
Recipes designed to educate you extensively on the penetration testing principles and Kali...
The 10th International Conference on Intelligent Tutoring Systems, ITS 2010, continued
the bi-annual series of top-flight international conferences on the use of advanced
educational technologies that are adaptive to users or groups of users. These highly
interdisciplinary conferences bring together researchers in the learning sciences,...
This book is intended for Information Technology (IT) professionals who have been
hearing about or have been tasked to evaluate, learn or implement data warehousing
technologies. This book also aims at providing fundamental techniques of KDD and Data
Mining as well as issues in practical use of Mining tools.
There has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data...
Revised and updated, this second edition of Walter Gautschi's successful Numerical Analysis explores computational methods for problems arising in the areas of classical analysis, approximation theory, and ordinary differential equations, among others. Topics included in the book are presented with a view toward...
With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.
f you run a Linux machine, you must think about security. Consider this story told by Scott, a system administrator we know:
In early 2001, I was asked to build two Linux servers for a client. They just wanted the machines installed and put online. I asked my boss if I should secure them, and he said no, the
Bridge the gap between a high-level understanding of how an algorithm works and knowing the nuts and bolts to tune your models better. This book will give you the confidence and skills when developing all the major machine learning models. In Pro Machine Learning Algorithms, you will first develop the algorithm in Excel so...
Object-oriented design methods are commonplace in computing systems development, but are often dismissed as 'boxes & arrows'. If systems developers are to gain full advantage from such methods, they should be able to achieve designs that are not merely the subject of heated argument, but can be improved by careful, rigorous &...
Database systems and database design technology have undergone significant evolution in recent years. The relational data model and relational database systems dominate business applications; in turn, they are extended by other technologies like data warehousing, OLAP, and data mining. How do you model and design your database application in...
The computing world has undergone a revolution since the publication of The С Programming Language in 1978. Big computers are much bigger, and personal computers have capabilities that rival the mainframes of a decade ago. During this time, С has changed too, although only modestly, and it has spread far beyond its origins as the...
Your all-in-one guide to unleashing your Mac’s full potential
It’s a Mac world out there. But if you haven’t read the instruction manual, you may be neglecting some of your computer’s coolest features. Turn to Macs All-in-One For Dummies’ jam-packed guide to access the incredible tools...