Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Murach's ADO.NET 4 Database Programming with C# 2010 (Murach: Training & Reference)
Murach's ADO.NET 4 Database Programming with C# 2010 (Murach: Training & Reference)

Now in its 4th Edition, this book shows C# developers how to use Visual Studio and ADO.NET to develop database applications the way the best professionals do. You'll learn how to:

  • quickly create Windows and web applications by dragging-and-dropping data controls in Visual Studio 2010
  • code your own...
Machine Learning Using R: With Time Series and Industry-Based Use Cases in R
Machine Learning Using R: With Time Series and Industry-Based Use Cases in R

Examine the latest technological advancements in building a scalable machine-learning model with big data using R. This second edition shows you how to work with a machine-learning algorithm and use it to build a ML model from raw data. You will see how to use R programming with TensorFlow, thus avoiding the effort of learning Python...

Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras

Build, scale, and deploy deep neural network models using the star libraries in Python

Key Features

  • Delve into advanced machine learning and deep learning use cases using Tensorflow and Keras
  • Build, deploy, and scale end-to-end deep neural network models in a production...
Dynamic Web Programming and HTML5
Dynamic Web Programming and HTML5

With organizations and individuals increasingly dependent on the Web, the need for competent, well-trained Web developers and maintainers is growing. Helping readers master Web development, Dynamic Web Programming and HTML5 covers specific Web programming languages, APIs, and coding techniques and provides an...

Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
This book presents new findings on cyber-physical systems design and modelling approaches based on AI and data-driven techniques, identifying the key industrial challenges and the main features of design and modelling processes. To enhance the efficiency of the design process, it proposes new approaches based on the concept of digital twins....
Enterprise JavaBeans (3rd Edition)
Enterprise JavaBeans (3rd Edition)
EnterpriseJavaBeans, 3rd edition, has been thoroughly revised to include complete coverage of three major changes in the EJB 2.0 specification: A new version of container-managed persistence; local interfaces; and a totally new kind of bean called the "message driven bean." The 3rd edition...
Drawing the Line: Art Therapy with the Difficult Client
Drawing the Line: Art Therapy with the Difficult Client
This resourceful guide presents art therapy techniques for difficult clients where the typical therapist-client interaction can often be distant, demanding, and frustrating. Offering practical and theoretical information from a wide variety of treatment populations and diagnostic categories; and incorporating individual, group, and family therapy...
Accelerated C# 2005
Accelerated C# 2005

Accelerated C# 2005 teaches you both how to use core C# language concepts and wisely employ C# idioms and object-oriented design patterns--to exploit the power of C# and the common language runtime. You'll quickly master C# syntax while learning how the CLR simplifies many programming tasks. You'll also learn best practices that ensure...

Strategies for Managing Is/It Personnel
Strategies for Managing Is/It Personnel

As IT staff shortages are being experienced worldwide, with a huge gap between the number of positions available for IS/IT workers and the number of available qualified workers to fill them. The major factors that have contributed to the IS/IT crisis include lack of understanding of the career orientations of IS personnel; high IS staff...

Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

unlimited object storage image
Result Page: 276 275 274 273 272 271 270 269 268 267 266 265 264 263 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy