|
|
|
|
|
|
Getting Started with Beautiful Soup
Enhance your web scraping skills with Beautiful Soup
About This Book
-
Learn about the features of Beautiful Soup with Python
-
Understand how to use a simple method to extract information from websites using Beautiful Soup and the Python urllib2 module
-
Master searching,...
| | Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... | | OZONE A New Medical Drug
Oxygen-ozone therapy is a complementary approach less known than homeopathy and acupuncture because it has come of age only three decades ago. This book clarifies that, in the often nebulous field of natural medicine, the biological bases of ozone therapy are totally in line with classic biochemical, physiological and pharmacological... |
|
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing... | | Advanced Quantitative Finance with C++
Create and implement mathematical models in C++ using Quantitative Finance
About This Book
-
Describes the key mathematical models used for price equity, currency, interest rates, and credit derivatives
-
The complex models are explained step-by-step along with a flow chart of every...
| | Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of... |
|
|
Result Page: 1145 1144 1143 1142 1141 1140 1139 1138 1137 1136 1135 1134 1133 1132 1131 1130 1129 1128 1127 |