Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Beginning Python Visualization: Crafting Visual Transformation Scripts
Beginning Python Visualization: Crafting Visual Transformation Scripts

We are visual animals. But before we can see the world in its true splendor, our brains, just like our computers, have to sort and organize raw data, and then transform that data to produce new images of the world. Beginning Python Visualization: Crafting Visual Transformation Scripts, Second Edition discusses turning many types of...

The Image Processing Handbook, Third Edition
The Image Processing Handbook, Third Edition
Image Processing Handbook covers methods for two different purposes:

improving the visual appearance of images to a human viewer

preparing images for measurement of the features and structures present

The handbook presents an extensive collection of image processing tools, enabling the user of computer-based system to...

Python: Data Analytics and Visualization
Python: Data Analytics and Visualization

Understand, evaluate, and visualize data About This Book - Learn basic steps of data analysis and how to use Python and its packages - A step-by-step guide to predictive modeling including tips, tricks, and best practices - Effectively visualize a broad set of analyzed data and generate effective results Who This Book Is For This book is for...

Fundamentals of Audio and Video Programming for Games
Fundamentals of Audio and Video Programming for Games

Deliver console-rocking sound, music, and video effects to your games with this all-in-one toolkit for C++ game programmers. From mixing and moving sounds around a 3-D space to taking video to the third dimension, you get expert insights and performance tips direct from the developers. It’s everything you need to fuel your...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Digital Photography: Expert Techniques
Digital Photography: Expert Techniques

Ready to take digital imaging to the professional level? This advanced strategy book offers expert advice to help you become more competent in your work routine, but it is not your ordinary workflow book. Through step-by-step procedures based on hard-nosed experience, professional photographer Ken Milburn covers much more...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

Outsider Art: From the Margins to the Marketplace
Outsider Art: From the Margins to the Marketplace

The term outsider art has been used to describe work produced exterior to the mainstream of modern art by certain self-taught visionaries, spiritualists, eccentrics, recluses, psychiatric patients, criminals, and others beyond the perceived margins of society. Yet the idea of such a raw, untaught creativity remains a...

Machine Learning Using R: With Time Series and Industry-Based Use Cases in R
Machine Learning Using R: With Time Series and Industry-Based Use Cases in R

Examine the latest technological advancements in building a scalable machine-learning model with big data using R. This second edition shows you how to work with a machine-learning algorithm and use it to build a ML model from raw data. You will see how to use R programming with TensorFlow, thus avoiding the effort of learning Python...

Agglomeration in Metallurgy (Topics in Mining, Metallurgy and Materials Engineering)
Agglomeration in Metallurgy (Topics in Mining, Metallurgy and Materials Engineering)
This book gives details on the processes of agglomeration and its role in modern metal production processes. It starts with a chapter on sinter production, also discussing the quality of sinter and environmental aspects involved on the process. The following chapters focus on pellet production and briquetting of natural and anthropogenic raw...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy