Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Web Scraping: Hands-on data scraping and crawling using PyQT, Selnium, HTML and Python, 2nd Edition
Python Web Scraping: Hands-on data scraping and crawling using PyQT, Selnium, HTML and Python, 2nd Edition

Successfully scrape data from any website with the power of Python 3.x

Key Features

  • A hands-on guide to web scraping using Python with solutions to real-world problems
  • Create a number of different web scrapers in Python to extract information
  • This book...
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics

Key Features

  • This easy-to-follow guide takes you through every step of the data wrangling process in the best possible way
  • Work with different types of datasets, and reshape the layout of your data to make it easier for analysis
  • Get simple examples and real-life data...
Big Data Visualization
Big Data Visualization
Learn effective tools and techniques to separate big data into manageable and logical components for efficient data visualization About This Book This unique guide teaches you how to visualize your cluttered, huge amounts of big data with ease It is rich with ample options and solid use cases for big data visualization, and is a must-have book...
Computational Physics: Problem Solving with Python
Computational Physics: Problem Solving with Python
The use of computation and simulation has become an essential part of the scientific process. Being able to transform a theory into an algorithm requires significant theoretical insight, detailed physical and mathematical understanding, and a working level of competency in programming.

This upper-division text provides an
...
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Java 9 Recipes: A Problem-Solution Approach
Java 9 Recipes: A Problem-Solution Approach

Quickly find solutions to dozens of common programming problems encountered while building Java applications. Content is presented in the popular problem-solution format. Look up the programming problem that you want to resolve. Read the solution. Apply the solution directly in your own code. Problem solved!

This...

Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
The creation of polymorphic algorithms is a necessary skill for programmers who intend to write reusable code. This book stands out for teaching programming based on polymorphism. Abundant examples in Java code and illustrative graphics of the main ideas related to the topic: Polymorphism in Java. The book "Polymorphism in Java" aims...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Practical LPIC-1 Linux Certification Study Guide
Practical LPIC-1 Linux Certification Study Guide
This book is your complete guide to studying for the Linux Professional Institute's Server Professional (LPIC-1) certification. Every concept, principle, process, and resource that might make an appearance on the exam is fully represented. You will understand every concept by rolling up your sleeves, opening up a terminal,...
Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Good Habits for Great Coding: Improving Programming Skills with Examples in Python
Good Habits for Great Coding: Improving Programming Skills with Examples in Python

Improve your coding skills and learn how to write readable code. Rather than teach basic programming, this book presumes that readers understand the fundamentals, and offers time-honed best practices for style, design, documenting, testing, refactoring, and more. 

Taking an informal, conversational tone,...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Result Page: 427 426 425 424 423 422 421 420 419 418 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy