Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Systems Analysis and Design (Shelly Cashman Series)
Systems Analysis and Design (Shelly Cashman Series)

Discover a practical, streamlined, updated approach to information systems development that covers both traditional and emerging technologies and approaches to systems analysis and design. SYSTEMS ANALYSIS AND DESIGN, 11E offers a well-organized, streamlined approach. Chapter objectives are keyed directly to chapter headings, making content...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Distributed Algorithms: An Intuitive Approach (The MIT Press)
Distributed Algorithms: An Intuitive Approach (The MIT Press)

A comprehensive guide to distributed algorithms that emphasizes examples and exercises rather than mathematical argumentation.

This book offers students and researchers a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models. It avoids mathematical...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Machine Learning with Python Cookbook: Practical Solutions from Preprocessing to Deep Learning
Machine Learning with Python Cookbook: Practical Solutions from Preprocessing to Deep Learning

This practical guide provides nearly 200 self-contained recipes to help you solve machine learning challenges you may encounter in your daily work. If you’re comfortable with Python and its libraries, including pandas and scikit-learn, you’ll be able to address specific problems such as loading data, handling text or...

TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning
TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning

Learn how to solve challenging machine learning problems with TensorFlow, Google’s revolutionary new software library for deep learning. If you have some background in basic linear algebra and calculus, this practical book introduces machine-learning fundamentals by showing you how to design systems capable of detecting objects...

Deep Learning Cookbook: Practical Recipes to Get Started Quickly
Deep Learning Cookbook: Practical Recipes to Get Started Quickly

Deep learning doesn’t have to be intimidating. Until recently, this machine-learning method required years of study, but with frameworks such as Keras and Tensorflow, software engineers without a background in machine learning can quickly enter the field. With the recipes in this cookbook, you’ll learn how to solve...

Python: Data Analytics and Visualization
Python: Data Analytics and Visualization

Understand, evaluate, and visualize data About This Book - Learn basic steps of data analysis and how to use Python and its packages - A step-by-step guide to predictive modeling including tips, tricks, and best practices - Effectively visualize a broad set of analyzed data and generate effective results Who This Book Is For This book is for...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools

Uncover the power of MySQL 8 for Big Data

About This Book

  • Combine the powers of MySQL and Hadoop to build a solid Big Data solution for your organization
  • Integrate MySQL with different NoSQL APIs and Big Data tools such as Apache Sqoop
  • A comprehensive guide with practical...
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Result Page: 737 736 735 734 733 732 731 730 729 728 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy