Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Subconscious Power: Use Your Inner Mind to Create the Life You've Always Wanted
Subconscious Power: Use Your Inner Mind to Create the Life You've Always Wanted
Activate the raw power of your subconscious to create the life you've always wanted, using six essential lessons from one of the world’s most renowned hypnotherapists.

Unsatisfying careers. Volatile, unhealthy relationships. Unfulfilled dreams. Too many of us are living lives that fall short of what we
...
Python: Data Analytics and Visualization
Python: Data Analytics and Visualization

Understand, evaluate, and visualize data About This Book - Learn basic steps of data analysis and how to use Python and its packages - A step-by-step guide to predictive modeling including tips, tricks, and best practices - Effectively visualize a broad set of analyzed data and generate effective results Who This Book Is For This book is for...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Gain all the essentials you need to create scalable microservices, which will help you solve real challenges when deploying services into production. This book will take you through creating a scalable data layer with polygot persistence. You’ll cover data access and query patterns in Spring and JPA in high-performance...
Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform
Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform

Enhance your development skills with Java's state-of-the-art features and projects to make your applications leaner and faster

Key Features

  • Overcome the challenges involved in migrating to new versions of Java
  • Discover how Oracle has bridged the gap between Java and...
Algorithms of the Intelligent Web
Algorithms of the Intelligent Web
Web 2.0 applications provide a rich user experience, but the parts you can't see are just as important-and impressive. They use powerful techniques to process information intelligently and offer features based on patterns and relationships in data. Algorithms of the Intelligent Web shows readers how to use the same techniques employed by...
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
Fundamentals of Algorithmics
Fundamentals of Algorithmics

This is an introductory-level algorithm book. It includes worked-out examples and detailed proofs. Presents Algorithms by type rather than application. KEY TOPICS: Includes structured material by techniques employed, not by the application area, so readers can progress from the underlying abstract concepts to the concrete application...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Digital Photography: Expert Techniques
Digital Photography: Expert Techniques

Ready to take digital imaging to the professional level? This advanced strategy book offers expert advice to help you become more competent in your work routine, but it is not your ordinary workflow book. Through step-by-step procedures based on hard-nosed experience, professional photographer Ken Milburn covers much more...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy