Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Lady Is a Spy: Virginia Hall, World War II Hero of the French Resistance (Scholastic Focus)
The Lady Is a Spy: Virginia Hall, World War II Hero of the French Resistance (Scholastic Focus)
The Lady Is a Spy is the audacious and riveting true story of Virginia Hall, America's greatest spy and unsung hero, brought to vivid life by acclaimed author Don Mitchell.

When Hitler invaded Poland, Virginia Hall was traveling in Europe. Which was dangerous enough, but as fighting erupted,
...
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies,...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers...
C++ Concurrency in Action
C++ Concurrency in Action
Summary

This bestseller has been updated and revised to cover all the latest changes to C++ 14 and 17! C++ Concurrency in Action, Second Edition teaches you everything you need to write robust and elegant multithreaded applications in C++17.

Purchase of the print book includes a free eBook in
...
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career

The role of the business analyst sits at the intersection of business operations, technology, and change management. The job requires a plethora of both soft skills and technical skills, as it must translate the needs of business users into action items for functional applications. On top of this, in-demand technologies...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Foundations for Analytics with Python
Foundations for Analytics with Python

If you’re like many of Excel’s 750 million users, you want to do more with your data—like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in...

Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
From Pulitzer Prize finalist Annie Jacobsen, the untold USA Today bestselling story of the CIA's secret paramilitary units.


Surprise . . . your target. Kill . . . your enemy. Vanish . . . without a trace.


When
...
Computational Probability: Algorithms and Applications in the Mathematical Sciences (International Series in Operations Research & Management Science)
Computational Probability: Algorithms and Applications in the Mathematical Sciences (International Series in Operations Research & Management Science)

This title organizes computational probability methods into a systematic treatment. The book examines two categories of problems. "Algorithms for Continuous Random Variables" covers data structures and algorithms, transformations of random variables, and products of independent random variables. "Algorithms for...

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Result Page: 129 128 127 126 125 124 123 122 121 120 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy