Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WebSphere Application Server Administration Using Jython
WebSphere Application Server Administration Using Jython
Save Time and Money: Streamline WebSphere Application Server Management with Jython Scripting!

 

Utilizing Jython scripting, you can dramatically reduce the effort, resources, and expense associated with managing WebSphere Application Server. WebSphere...

Raspberry Pi Projects
Raspberry Pi Projects

Learn to build software and hardware projects featuring the Raspberry Pi!

Raspberry Pi represents a new generation of computers that encourages the user to play and to learn and this unique book is aimed at the beginner Raspberry Pi user who is eager to get started creating real-world projects. Taking you on a journey of...

Building Machine Learning Systems with Python - Second Edition
Building Machine Learning Systems with Python - Second Edition

Get more from your data through creating practical machine learning systems with Python

About This Book

  • Build your own Python-based machine learning systems tailored to solve any problem
  • Discover how Python offers a multiple context solution for create machine learning systems
  • ...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Python Descriptors: Understanding and Using the Descriptor Protocol
Python Descriptors: Understanding and Using the Descriptor Protocol
Create descriptors and see ideas and examples of how to use descriptors effectively. In this short book, you’ll explore descriptors in general, with a deep explanation of what descriptors are, how they work, and how they're used. Once you understand the simplicity of the descriptor protocol, the author delves into...
Regular Expression Pocket Reference
Regular Expression Pocket Reference
Ideal as an introduction for beginners and a quick reference for advanced programmers, Regular Expression Pocket Reference is a comprehensive guide to regular expression APIs for C, Perl, PHP, Java, .NET, Python, vi, and the POSIX regular expression libraries. This handy book offers programmers a complete overview...
A Practical Approach to WBEM/CIM Management
A Practical Approach to WBEM/CIM Management

System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management WBEM and its Component Information Model (CIM) provide the architecture, language,...

Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
As two of the leading MVC web frameworks for Python, Django and TurboGears allow you to develop and launch sites in a fraction of the time compared to traditional techniques and they provide greater stability, scalability, and management than alternatives. Packed with examples, this book will help you discover a new methodology for designing,...
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling

Get to grips with the essentials of deep learning by leveraging the power of Python

Key Features

  • Your one-stop solution to get started with the essentials of deep learning and neural network modeling
  • Train different kinds of neural networks to tackle various problems in...
Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Think Data Structures: Algorithms and Information Retrieval in Java
Think Data Structures: Algorithms and Information Retrieval in Java

If you’re a student studying computer science or a software developer preparing for technical interviews, this practical book will help you learn and review some of the most important ideas in software engineering—data structures and algorithms—in a way that’s clearer, more concise, and more engaging than...

Mastering Vim: Build a software development environment with Vim and Neovim
Mastering Vim: Build a software development environment with Vim and Neovim

Mastering Vim, reviewed by Bram Moolenaar, the creator of Vim, covers usage of Vim and Neovim, showcases relevant plugins, and teaches Vimscript

Key Features

  • Expert Vim and Vimscript techniques to work with Python and other development environment
  • Accomplish end-to-end...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy