 |
|
 Dreamweaver CC For Dummies
Turn your wonderful website dreams into robust realities with the help of Dreamweaver CC For Dummies!
Creating dynamic websites is easy with Dreamweaver CC and this friendly, full-color guide. Updated for the latest version of Adobe's world-renowned web development tool, Dreamweaver CC For... |  |  Deep Learning Cookbook: Practical Recipes to Get Started Quickly
Deep learning doesn’t have to be intimidating. Until recently, this machine-learning method required years of study, but with frameworks such as Keras and Tensorflow, software engineers without a background in machine learning can quickly enter the field. With the recipes in this cookbook, you’ll learn how to solve... |  |  The Seventh Function of Language: A Novel
From the prizewinning author of HHhH, “the most insolent novel of the year” (L’Express) is a romp through the French intelligentsia of the twentieth century.
Paris, 1980. The literary critic Roland Barthes diesâstruck by a laundry vanâafter lunch with the presidential... |
|
 Wellbeing (The Art of Living)
The politics of wellbeing and the new science of happiness have shot up the agenda since Martin Seligman coined the phrase "positive psychology". After all, who does not want to live the good life? So ten years on, why is it that much of this otherwise welcome debate sounds like as much apple-pie - "work less", "earn... |  |  Java: Data Science Made Easy
Data collection, processing, analysis, and more
About This Book
-
Your entry ticket to the world of data science with the stability and power of Java
-
Explore, analyse, and visualize your data effectively using easy-to-follow examples
-
A highly practical course covering a broad...
|  |  Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement... |
|
|
|
| Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 |