Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Intel Edison Projects: Build exciting IoT projects with Intel Edison
Intel Edison Projects: Build exciting IoT projects with Intel Edison

Build powerful Robots and IoT solutions using Intel Edison

About This Book

  • Learn to build advanced level robots with Intel Edison and Arduino
  • Efficiently build and program home automation and IoT projects with Intel Edison
  • Master the skills of creating...
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

Eigenstructure Control Algorithms: Applications to aircraft/rotorcraft handling qualities design (Control, Robotics and Sensors)
Eigenstructure Control Algorithms: Applications to aircraft/rotorcraft handling qualities design (Control, Robotics and Sensors)

Eigenstructure control involves modification of both the eigenvalues and eigenvectors of a system using feedback. Based on this key concept, algorithms are derived for the design of control systems using controller structures such as state feedback, output feedback, observer-based dynamic feedback, implicit and explicit...

T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Reactive Programming with Angular and ngrx: Learn to Harness the Power of Reactive Programming with RxJS and ngrx Extensions
Reactive Programming with Angular and ngrx: Learn to Harness the Power of Reactive Programming with RxJS and ngrx Extensions

Manage your Angular development using Reactive programming. Growing in popularity and now an essential part of any professional web developer's toolkit, Reactive programming can enrich your development and make your code more efficient.

Featuring a core application to explore and build yourself, this book shows you...

JavaScript: Novice to Ninja
JavaScript: Novice to Ninja

JavaScript is a must-have skill for all web developers. JavaScript: Novice to Ninja is a fun, practical, and comprehensive guide to the modern usage of this deceptively powerful language. Comprehensively updated to cover ECMAScript 6 and modern JavaScript development, the second edition of this step-by-step introduction to...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
With the evolution of our complex technological society and the introduction of new notions and innovative theoretical tools in the field of intelligent systems, the field of neural networks is undergoing an enormous evolution. These evolving and innovative theoretical tools are centered around the theory of soft computing, a theory that embodies...
NTP Security: A Quick-Start Guide
NTP Security: A Quick-Start Guide

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.

NTP Security: A Quick-Start...

Result Page: 101 100 99 98 97 96 95 94 93 92 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy