Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...
Learn how to use TensorFlow 2.0 to build machine learning and deep learning models with complete examples.
The book begins with introducing TensorFlow 2.0 framework and the major changes from its last release. Next, it focuses on building Supervised Machine Learning models using TensorFlow 2.0....
A groundbreaking text to the study of textile fibers that bridges the knowledge gap between fiber shape and end uses
Textile Fiber Microscopy offers an important and comprehensive guide to the study of textile fibers and contains a unique text that prioritizes a review of fibers’ microstructure,...
Discover THE next big competitive advantage in business: learn how augmented and virtual reality can put your business ahead.
Augmented reality (AR) and virtual reality (VR) are part of a new wave of immersive technologies that offer huge opportunities for businesses, across industries and regardless of...
Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical...
As the means by which Internet destinations are communicated between subscribers and service providers, BGP-4 provides a critical function for Internet operations. Whether associated with Internet service providers or enterprise networks that depend heavily on the Internet, a background in BGP-4 is essential. Moving beyond...
The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based...
When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.
Authored by Perforce's own VP of product technology, ...
Many IT projects fail to deliver the benefits to the business that they promised. This is despite the fact that IT managers and staff work hard to meet the needs of the business by putting systems into place and ensuring that network operations are reliable and stable. The cause of this problem is almost always a misalignment of IT within the...
On any given day there are more than 7 million items listed for auction at ebay (ebay), the world's largest online trading community. At the end of its last fiscal quarter, ebay had 49.7 million registered users, more than double the number of users just two years previous. It is estimated that $9.3 billion worth of merchandise, in more than 423...
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic...
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.