Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Learn TensorFlow 2.0: Implement Machine Learning and Deep Learning Models with Python
Learn TensorFlow 2.0: Implement Machine Learning and Deep Learning Models with Python
Learn how to use TensorFlow 2.0 to build machine learning and deep learning models with complete examples. 

The book begins with introducing TensorFlow 2.0 framework and the major changes from its last release. Next, it focuses on building Supervised Machine Learning models using TensorFlow 2.0.
...
Textile Fiber Microscopy: A Practical Approach
Textile Fiber Microscopy: A Practical Approach

A groundbreaking text to the study of textile fibers that bridges the knowledge gap between fiber shape and end uses

Textile Fiber Microscopy offers an important and comprehensive guide to the study of textile fibers and contains a unique text that prioritizes a review of fibers’ microstructure,...

Reality Check: How Immersive Technologies Can Transform Your Business
Reality Check: How Immersive Technologies Can Transform Your Business

Discover THE next big competitive advantage in business: learn how augmented and virtual reality can put your business ahead.

Augmented reality (AR) and virtual reality (VR) are part of a new wave of immersive technologies that offer huge opportunities for businesses, across industries and regardless of
...

Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption

Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical...

Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)
Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)

As the means by which Internet destinations are communicated between subscribers and service providers, BGP-4 provides a critical function for Internet operations. Whether associated with Internet service providers or enterprise networks that depend heavily on the Internet, a background in BGP-4 is essential. Moving beyond...

Linux in a Windows World
Linux in a Windows World
The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based...
Practical Perforce
Practical Perforce

When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.

Authored by Perforce's own VP of product technology, ...

Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Many IT projects fail to deliver the benefits to the business that they promised. This is despite the fact that IT managers and staff work hard to meet the needs of the business by putting systems into place and ensuring that network operations are reliable and stable. The cause of this problem is almost always a misalignment of IT within the...
Absolute Beginner's Guide to eBay (3rd Edition)
Absolute Beginner's Guide to eBay (3rd Edition)

On any given day there are more than 7 million items listed for auction at ebay (ebay), the world's largest online trading community. At the end of its last fiscal quarter, ebay had 49.7 million registered users, more than double the number of users just two years previous. It is estimated that $9.3 billion worth of merchandise, in more than 423...

Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic...
CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

unlimited object storage image
Result Page: 727 726 725 724 723 722 721 720 719 718 717 716 715 714 713 712 711 710 709 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy