Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Core Java Volume I--Fundamentals (10th Edition) (Core Series)
Core Java Volume I--Fundamentals (10th Edition) (Core Series)

Core Java® has long been recognized as the leading, no-nonsense tutorial and reference for experienced programmers who want to write robust Java code for real-world applications. Now, Core Java®, Volume I–Fundamentals, Tenth Edition, has been extensively updated to reflect the...

The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)
The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)

Create Thriving, High-Performing Teams and Organizations with Scrumban

 

Scrumban allows you to use Kanban as a catalyst for increasingly valuable changes to your existing software development processes, amplifying and expanding upon Scrum’s...

Advanced Programming in the UNIX Environment, 3rd Edition
Advanced Programming in the UNIX Environment, 3rd Edition

For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens’ Advanced Programming in the UNIX® Environment . Now, once again, Rich’s colleague Steve...

CURRENT Medical Diagnosis and Treatment 2017 (Lange)
CURRENT Medical Diagnosis and Treatment 2017 (Lange)

This #1 annual internal medicine and clinical practice guide turns the latest research into improved patient outcomes – now fully updated and revised.

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Numerical Techniques in Electromagnetics with MATLAB
Numerical Techniques in Electromagnetics with MATLAB

Despite the dramatic growth in the availability of powerful computer resources, the EM community lacks a comprehensive text on the computational techniques used to solve EM problems. The first edition of Numerical Techniques in Electromagnetics filled that gap and became the reference of choice for thousands of engineers,...

Discrete and Continuous Fourier Transforms: Analysis, Applications and Fast Algorithms
Discrete and Continuous Fourier Transforms: Analysis, Applications and Fast Algorithms
Long employed in electrical engineering, the discrete Fourier transform (DFT) is now applied in a range of fields through the use of digital computers and fast Fourier transform (FFT) algorithms. But to correctly interpret DFT results, it is essential to understand the core and tools of Fourier analysis. Discrete and Continuous Fourier...
Introduction to Algorithms, Third Edition (International Edition)
Introduction to Algorithms, Third Edition (International Edition)

A new edition of the essential text and professional reference, with substantial new material on such topics as vEB trees, multithreaded algorithms, dynamic programming, and edge-based flow.

Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Result Page: 462 461 460 459 458 457 456 455 454 453 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy