Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence

Design, create and manage robust Power BI solutions to gain meaningful business insights

Key Features

  • Master all the dashboarding and reporting features of Microsoft Power BI
  • Combine data from multiple sources, create stunning visualizations and publish your reports across...
15 Dangerously Mad Projects for the Evil Genius
15 Dangerously Mad Projects for the Evil Genius

UNLEASH YOUR INNER MAD SCIENTIST!

"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing

This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for...

Macroeconomic Policy in Fragile States
Macroeconomic Policy in Fragile States
Setting macroeconomic policy is especially difficult in fragile states. Political legitimacy concerns are heightened, raising issues such as who the policymakers are, what incentives they face, and how the process of policymaking is likely to work under limited legitimacy and high uncertainty
both about the macroeconomic environment
...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework

Design, build, and deploy powerful applications with amazing user interfaces on embedded, mobile, and desktop platforms

Key Features

  • Easily compile, run, and debug your applications from the powerful Qt Creator IDE
  • Future-proof your applications with Qt Test and modern...
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
How to Cheat at IIS 7 Server Administration
How to Cheat at IIS 7 Server Administration
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of...
Mastering R for Quantitative Finance
Mastering R for Quantitative Finance

Use R to optimize your trading strategy and build up your own risk management system

About This Book

  • Learn to manipulate, visualize, and analyze a wide range of financial data with the help of built-in functions and programming in R
  • Understand the concepts of financial engineering and...
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities

Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled Machine Vision) clearly and systematically presents the basic methodology of computer and machine vision, covering the essential elements of the theory while emphasizing algorithmic and practical design constraints. This fully revised fourth edition has...

Modelling and Reasoning with Vague Concepts
Modelling and Reasoning with Vague Concepts
Vagueness is central to the flexibility and robustness of natural language descriptions. Vague concepts are robust to the imprecision of our perceptions, while still allowing us to convey useful, and sometimes vital, information. The study of vagueness in Artificial Intelligence (AI) is therefore motivated by the desire to incorporate this...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy