Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Data Scientists at Work
Data Scientists at Work

Data Scientists at Work is a collection of interviews with sixteen of the world's most influential and innovative data scientists from across the spectrum of this hot new profession. "Data scientist is the sexiest job in the 21st century," according to the Harvard Business Review. By 2018, the United States will...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Adobe® Photoshop® CS2 Official JavaScript Reference
Adobe® Photoshop® CS2 Official JavaScript Reference

Do you spend too much time doing repetitive production tasks such as placing and replacing images, resizing them, dragging them from one document to another, and preparing images for printing instead of being creative? Do you use Adobe Photoshop CS2 and have some experience with scripting? You're in luck. Since Adobe Creative...

The Photoshop CS2 Book for Digital Photographers (Voices That Matter)
The Photoshop CS2 Book for Digital Photographers (Voices That Matter)
Scott Kelby, the best-selling Photoshop author in the world today, once again takes this book to a whole new level as he uncovers the latest, most important and most exciting new Adobe Photoshop CS2 techniques for digital photographers.This major update to this award-winning, record-breaking book does something for digital photographers that's...
Python Automation Cookbook: Explore the world of automation using Python recipes that will enhance your skills
Python Automation Cookbook: Explore the world of automation using Python recipes that will enhance your skills

Step-by-step instructions which take you through each program to automate monotonous tasks with Python 3.7

Key Features

  • Automate integral business processes such as report generation, email marketing, and lead generation
  • Build your first web application that scrapes data...
Fundamentals of Audio and Video Programming for Games
Fundamentals of Audio and Video Programming for Games

Deliver console-rocking sound, music, and video effects to your games with this all-in-one toolkit for C++ game programmers. From mixing and moving sounds around a 3-D space to taking video to the third dimension, you get expert insights and performance tips direct from the developers. It’s everything you need to fuel your...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Digital Photography: Expert Techniques
Digital Photography: Expert Techniques

Ready to take digital imaging to the professional level? This advanced strategy book offers expert advice to help you become more competent in your work routine, but it is not your ordinary workflow book. Through step-by-step procedures based on hard-nosed experience, professional photographer Ken Milburn covers much more...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy