Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Connecting Arduino to the Web: Front End Development Using JavaScript
Connecting Arduino to the Web: Front End Development Using JavaScript
Create physical interfaces that interact with the Internet and web pages. With Arduino and JavaScript you can create interactive physical displays and connected devices that send data to or receive data from the web. You'll take advantage of the processes needed to set up electronic components, collect data, and create web pages able to...
Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition
Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition

Master the capabilities of PostgreSQL 11 to efficiently manage and maintain your database

Key Features

  • Master advanced concepts of PostgreSQL 11 with real-world datasets and examples
  • Explore query parallelism, data replication, and database performance while working with...
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers...
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow

Implement state-of-the-art deep reinforcement learning algorithms using Python and its powerful libraries

Key Features

  • Implement Q-learning and Markov models with Python and OpenAI
  • Explore the power of TensorFlow to build self-learning models
  • Eight AI...
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.

...
Building Your Online Store With WordPress and WooCommerce: Learn to Leverage the Critical Role E-commerce Plays in Today’s Competitive Marketplace
Building Your Online Store With WordPress and WooCommerce: Learn to Leverage the Critical Role E-commerce Plays in Today’s Competitive Marketplace

Teaches you all about e-commerce and how to create your own online shop using WordPress and WooCommerce. Regardless of a business’s size, e-commerce helps level the playing field, increases a business’s exposure, allows companies to reach customers globally, and streamlines the fulfillment process. In the past, e-commerce...

Mathematics of Discrete Structures for Computer Science
Mathematics of Discrete Structures for Computer Science

Mathematics plays a key role in computer science, some researchers would consider computers as nothing but the physical embodiment of mathematical systems. And whether you are designing a digital circuit, a computer program or a new programming language, you need mathematics to be able to reason about the design -- its correctness,...

R Deep Learning Essentials
R Deep Learning Essentials

Key Features

  • Harness the ability to build algorithms for unsupervised data using deep learning concepts with R
  • Master the common problems faced such as overfitting of data, anomalous datasets, image recognition, and performance tuning while building the models
  • Build models relating to neural...
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)

This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future development of advanced smart grids that operated in a peer-to-peer fashion,...

How to Make a Robot
How to Make a Robot

Learn the basics of modern robotics while building your own intelligent robot from scratch! You'll use inexpensive household materials to make the base for your robot, then add motors, power, wheels, and electronics.

But wait, it gets better: your creation is actually five robots in one! -- build
...

Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
Result Page: 139 138 137 136 135 134 133 132 131 130 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy