Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert Python Programming: Become a master in Python by learning coding best practices and advanced programming concepts in Python 3.7, 3rd Edition
Expert Python Programming: Become a master in Python by learning coding best practices and advanced programming concepts in Python 3.7, 3rd Edition

Refine your Python programming skills and build professional grade applications with this comprehensive guide

Key Features

  • Create manageable code that can run in various environments with different sets of dependencies
  • Implement effective Python data structures and...
Data Science Algorithms in a Week: Top 7 algorithms for scientific computing, data analysis, and machine learning, 2nd Edition
Data Science Algorithms in a Week: Top 7 algorithms for scientific computing, data analysis, and machine learning, 2nd Edition

Build a strong foundation of machine learning algorithms in 7 days

Key Features

  • Use Python and its wide array of machine learning libraries to build predictive models
  • Learn the basics of the 7 most widely used machine learning algorithms within a week
  • Know...
Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition
Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition

Get up-to-date with the finer points of Ubuntu Server using this comprehensive guide

Key Features

  • A practical easy-to-understand book that will teach you how to deploy, maintain and troubleshoot Ubuntu Server
  • Get well-versed with newly-added features in Ubuntu 18.04.
  • ...
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Beginning Functional JavaScript: Uncover the Concepts of Functional Programming with EcmaScript 8
Beginning Functional JavaScript: Uncover the Concepts of Functional Programming with EcmaScript 8

Understand functional programming concepts and the functional nature of the JavaScript language. Starting with an introduction to functional programming concepts, you will learn the key differences between imperative and functional programming. Diving straight into JavaScript functions, you will learn to write them with ES8. Followed...

Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Tkinter GUI Application Development Blueprints - Second Edition: Build nine projects by working with widgets, geometry management, event handling, and more
Tkinter GUI Application Development Blueprints - Second Edition: Build nine projects by working with widgets, geometry management, event handling, and more

Geometry Management, Event Handling, and more

Key Features

  • A Practical, guide to learn the application of Python and GUI programming with tkinter
  • Create multiple cross-platform real-world projects by integrating host of third party libraries and tools
  • ...
Scratch by Example: Programming for All Ages
Scratch by Example: Programming for All Ages
This is a book about learning the Scratch language so that you can use it in teaching and other instructional situations. The book explains the visual nature of the language, showing you how to write programs by dragging and dropping visual blocks representing common compute operations. 

Scratch is visual...
Principles of Partial Differential Equations (Problem Books in Mathematics)
Principles of Partial Differential Equations (Problem Books in Mathematics)

This concise book covers the classical tools of PDE theory used in today's science and engineering: characteristics, the wave propagation, the Fourier method, distributions, Sobolev spaces, fundamental solutions, and Green's functions. The approach is problem-oriented, giving the reader an opportunity to master solution techniques. The...

Partial Differential Equations and the Finite Element Method
Partial Differential Equations and the Finite Element Method
A systematic introduction to partial differential equations and modern finite element methods for their efficient numerical solution

Partial Differential Equations and the Finite Element Method provides a much-needed, clear, and systematic introduction to modern theory of partial differential equations (PDEs) and...

Unity 2018 Shaders and Effects Cookbook: Transform your game into a visually stunning masterpiece with over 70 recipes, 3rd Edition
Unity 2018 Shaders and Effects Cookbook: Transform your game into a visually stunning masterpiece with over 70 recipes, 3rd Edition

Bring realism to your games by mastering post-processing effects and advanced shading techniques in Unity 2018

Key Features

  • Learn the secrets of creating AAA quality shaders without writing long algorithms
  • Master shader programming through easy-to-follow examples
  • ...
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Result Page: 112 111 110 109 108 107 106 105 104 103 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy