Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
NumPy Cookbook
NumPy Cookbook
We, NumPy users, live in exciting times. New NumPy-related developments seem to come to our attention every week or maybe even daily. When this book was being written, NumPy Foundation of Open Code for Usable Science was created. The Numba project—NumPy-aware, dynamic Python compiler using LLVM—was announced. Also,...
Neural Networks in Business Forecasting
Neural Networks in Business Forecasting

Forecasting is one of the most important activities that form the basis for strategic, tactical, and operational decisions in all business organizations. Recently, neural networks have emerged as an important tool for business forecasting. There are considerable interests and applications in forecasting using neural networks. Neural Networks...

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

C# Game Programming Cookbook for Unity 3D
C# Game Programming Cookbook for Unity 3D

This second edition of C# Game Programming Cookbook for Unity 3D expounds upon the first with more details and techniques. With a fresh array of chapters, updated C# code and examples, Jeff W. Murray’s book will help the reader understand structured game development in Unity unlike ever before.

New to this...

Advances in Mobile Robotics: Proceedings of the Eleventh International Conference on Climbing and Walking Robots and the Support Technologies
Advances in Mobile Robotics: Proceedings of the Eleventh International Conference on Climbing and Walking Robots and the Support Technologies
This book provides state-of-the-art scientific and engineering research findings and developments in the area of mobile robotics and associated support technologies. It contains peer-reviewed articles presented at the CLAWAR 2008 conference. Robots are no longer confined to industrial manufacturing environments; rather, a great deal of interest is...
Adobe Flex 2: Training from the Source
Adobe Flex 2: Training from the Source
Part of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus...
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

The Customer Rules
The Customer Rules
At a recent family gathering in my home, the grown-ups were trading stories about companies that provide good customer service and those that don't. Out of curiosity, I asked my then twelve-year-old granddaughter, Margot, what she thought were the most important rules for great service. Without a moment's hesitation, she...
Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition
Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition

Harness the power of Linux to create versatile and robust embedded solutions

Key Features

  • Learn how to develop and configure robust embedded Linux devices
  • Explore the new features of Linux 5.4 and the Yocto Project 3.1 (Dunfell)
  • Discover different ways to...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Beginning J2ME: From Novice to Professional, Third Edition
Beginning J2ME: From Novice to Professional, Third Edition

J2ME is a platform for wireless and mobile Java application development. Beginning J2ME makes this and all the fun you can have with it accessible to the first time wireless Java developer as well as useful to the experienced. This book includes coverage such as sound HTTPS support, lots of user interface API enhancements, a Game API,...

Professional Linux Programming
Professional Linux Programming
By tapping the strengths of the open-source movement, developers can write custom Linux software without spending a dime on licensing fees. Aimed at the experienced C/C++ programmer, Professional Linux Programming provides a wide-ranging and hands-on guide to the different pieces of the puzzle that are required to program successfully...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy