Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

Mathematics of Discrete Structures for Computer Science
Mathematics of Discrete Structures for Computer Science

Mathematics plays a key role in computer science, some researchers would consider computers as nothing but the physical embodiment of mathematical systems. And whether you are designing a digital circuit, a computer program or a new programming language, you need mathematics to be able to reason about the design -- its correctness,...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Coding Games in Scratch: A Step-by-Step Visual Guide to Building Your Own Computer Games
Coding Games in Scratch: A Step-by-Step Visual Guide to Building Your Own Computer Games

Written for children ages 8–12 with little to no coding experience, this straightforward visual guide uses fun graphics and easy-to-follow instructions to show young learners how to build their own computer projects using Scratch, a popular free programming language.

With Coding Games in Scratch, kids can build single...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
Decompiling Java
Decompiling Java
WHEN COREL BOUGHT WordPerfect for almost $200 million from the Novell Corporation in the mid 1990s, nobody would have thought that in a matter of months they would have been giving away the source code free. However, when Corel ported WordPerfect to Java and released it as a beta product, a simple program called Mocha1 could...
Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Bayesian Artificial Intelligence, Second Edition
Bayesian Artificial Intelligence, Second Edition

Updated and expanded, Bayesian Artificial Intelligence, Second Edition provides a practical and accessible introduction to the main concepts, foundation, and applications of Bayesian networks. It focuses on both the causal discovery of networks and Bayesian inference procedures. Adopting a causal interpretation of Bayesian...

JavaScript: JavaScript For Beginners - Learn JavaScript with ease in HALF THE TIME - Everything about the Language, Coding, Programming and Web Pages that you need to know!
JavaScript: JavaScript For Beginners - Learn JavaScript with ease in HALF THE TIME - Everything about the Language, Coding, Programming and Web Pages that you need to know!

Java Script Learn all about one of the most widely used programming languages and get this great book now! Would you be interested in learning Java Script, the one of the most commonly used languages in programming which can help you create interactive websites? Then learning about Java Script would be perfect for you. Without...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
The world of wiring tends to move in cycles, so to speak. The basic science that causes your blender to whir when you plug the cord into a wall outlet doesn’t change, but the ways we harness and manage electrical power are constantly improving—always with an eye toward safety. The Complete Guide to Wiring changes, too....
IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

Result Page: 55 54 53 52 51 50 49 48 47 46 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy