Home | Amazing | Today | Tags | Publishers | Years | Search 
Ruby Data Processing: Using Map, Reduce, and Select
Ruby Data Processing: Using Map, Reduce, and Select
Gain the basics of Ruby’s map, reduce, and select functions and discover how to use them to solve data-processing problems. This compact hands-on book explains how you can encode certain complex programs in 10 lines of Ruby code, an astonishingly small number. You will walk through problems and solutions which are effective...
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms

Investigate, analyze, and report iOS, Android, and Windows devices

Key Features

  • Get hands-on experience in performing simple to complex mobile forensics techniques
  • Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected...
Practical Video Game Bots: Automating Game Processes using C++, Python, and AutoIt
Practical Video Game Bots: Automating Game Processes using C++, Python, and AutoIt

Develop and use bots in video gaming to automate game processes and see possible ways to avoid this kind of automation. This book explains how bots can be very helpful in games such as multiplayer online games, both for training your character and for automating repetitious game processes in order to start a competition with human...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building up to higher-order models. Included in the higher-order discussions are multivariate models, higher-order...
Advanced Materials for Membrane Fabrication and Modification
Advanced Materials for Membrane Fabrication and Modification

Membranes are an energy efficient separation technology that are now the basis for many water treatment and food processing applications. However, there is the potential to improve the operating performance of these separations and to extend the application of membranes to energy production, gas separations, organic solvent-based...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Reverse Design: A Current Scientific Vision From the International Fashion and Design Congress
Reverse Design: A Current Scientific Vision From the International Fashion and Design Congress

The collaboration between the Textile Department of the University of Minho and the Brazilian Association of Studies and Research (ABEPEM) has led to an international platform for the exchange of research in the field of Fashion and Design: CIMODE. This platform is designed as a biennial congress that takes place in different...

Three Laws of Nature: A Little Book on Thermodynamics
Three Laws of Nature: A Little Book on Thermodynamics
A short and entertaining introduction to thermodynamics that uses real-world examples to explain accessibly an important but subtle scientific theory
 
A romantic description of the second law of thermodynamics is that the universe becomes increasingly disordered. But what does that actually mean? Starting with
...
 
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy