Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

C++17 Standard Library Quick Reference: A Pocket Guide to Data Structures, Algorithms, and Functions
C++17 Standard Library Quick Reference: A Pocket Guide to Data Structures, Algorithms, and Functions
This quick reference is a condensed guide to the essential data structures, algorithms, and functions provided by the C++17 Standard Library. It does not explain the C++ language or syntax, but is accessible to anyone with basic C++ knowledge or programming experience. Even the most experienced C++ programmer will learn a thing or two...
Strontium Contamination in the Environment (The Handbook of Environmental Chemistry)
Strontium Contamination in the Environment (The Handbook of Environmental Chemistry)

This book provides an authoritative review of the origin and extraction of strontium and its impact on the environment. It also presents the latest strontium decontamination and remediation strategies. Around the globe, nuclear power is being recognized as a major source of energy and is expected to play a crucial role in...

MongoDB 4 Quick Start Guide: Learn the skills you need to work with the world's most popular NoSQL database
MongoDB 4 Quick Start Guide: Learn the skills you need to work with the world's most popular NoSQL database

A fast paced guide that will help you to create, read, update and delete data using MongoDB

Key Features

  • Create secure databases with MongoDB
  • Manipulate and maintain your database
  • Model and use data in a No SQL environment with MongoDB

...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Rust Programming By Example: Enter the world of Rust by building engaging, concurrent, reactive, and robust applications
Rust Programming By Example: Enter the world of Rust by building engaging, concurrent, reactive, and robust applications

Discover the world of Rust programming through real-world examples

Key Features

  • Implement various features of Rust to build blazingly fast applications
  • Learn to build GUI applications using Gtk-rs
  • Explore the multi-threading aspect of Rust to tackle...
WebRTC Blueprints
WebRTC Blueprints

Develop your very own media applications and services using WebRTC

Overview

  • Create interactive web applications using WebRTC
  • Get introduced to advanced technologies such as WebSocket and Erlang
  • Develop your own secure web applications and services with practical projects
  • ...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Bitcoin for the Befuddled
Bitcoin for the Befuddled

Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin—the game-changing digital currency used by millions worldwide.

But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions...

Result Page: 45 44 43 42 41 40 39 38 37 36 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy