Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python 3 Text Processing with NLTK 3 Cookbook
Python 3 Text Processing with NLTK 3 Cookbook

Over 80 practical recipes on natural language processing techniques using Python's NLTK 3.0

About This Book

  • Break text down into its component parts for spelling correction, feature extraction, and phrase transformation
  • Learn how to do custom sentiment analysis and named entity...
Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Professional Python
Professional Python

Master the secret tools every Python programmer needs to know

Professional Python goes beyond the basics to teach beginner- and intermediate-level Python programmers the little-known tools and constructs that build concise, maintainable code. Design better architecture and write easy-to-understand code using highly...

Regular Expression Recipes for Windows Developers: A Problem-Solution Approach
Regular Expression Recipes for Windows Developers: A Problem-Solution Approach

Regular Expressions are an essential part of programming, but they can be hard to come to grips with. Regular Expression Recipes for Windows Developers contains over 100 of the most popular regular expressions, along with explanations of how to use each one. Languages covered include JavaScript, VB, VB.NET, and C#.

This...

Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare,...
Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
Eclipse for Dummies
Eclipse for Dummies
That’s what New York City Mayor Fiorello LaGuardia said back in 1934. Not
many people understood the meaning or the impact of Mayor LaGuardia’s
statement, because he said it in Latin. (“E finita la cuccagna,” said the mayor.)
But today, most people agree with the spirit of LaGuardia’s proclamation....
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Compilers: Principles, Techniques, and Tools (2nd Edition)
Compilers: Principles, Techniques, and Tools (2nd Edition)

In the time since the 1986 edition of this book, the world of compiler design has changed significantly. Programming languages have evolved to present new compilation problems. Computer architectures offer a variety of resources of which the compiler designer must take advantage. Perhaps most interestingly, the venerable technology of...

Designing Active Server Pages
Designing Active Server Pages
Designing Active Server Pages provides an important tool for often-overworked ASP programmers: a set of techniques for making the wisest use of the technology in a production environment. Targeting an audience of readers who already are seasoned in ASP, author Scott Mitchell explores techniques for producing "reusable and robust...
104 Number Theory Problems: From the Training of the USA IMO Team
104 Number Theory Problems: From the Training of the USA IMO Team
This challenging problem book by renowned US Olympiad coaches, mathematics teachers, and researchers develops a multitude of problem-solving skills needed to excel in mathematical contests and research in number theory. Offering inspiration and intellectual delight, the problems throughout the book encourage students to express their ideas,...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
unlimited object storage image
Result Page: 61 60 59 58 57 56 55 54 53 52 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy