Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Common-Sense Guide to Data Structures and Algorithms: Level Up Your Core Programming Skills
A Common-Sense Guide to Data Structures and Algorithms: Level Up Your Core Programming Skills

Algorithms and data structures are much more than abstract concepts. Mastering them enables you to write code that runs faster and more efficiently, which is particularly important for today’s web and mobile apps. This book takes a practical approach to data structures and algorithms, with techniques and real-world scenarios...

Python: Data Analytics and Visualization
Python: Data Analytics and Visualization

Understand, evaluate, and visualize data About This Book - Learn basic steps of data analysis and how to use Python and its packages - A step-by-step guide to predictive modeling including tips, tricks, and best practices - Effectively visualize a broad set of analyzed data and generate effective results Who This Book Is For This book is for...

Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

The advent of increasingly large consumer collections of audio(e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube)is driving a need not only for multimedia retrieval but alsoinformation extraction from and across media. Furthermore,industrial and government collections fuel requirements for stockmedia access, media preservation,...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

Learning Predictive Analytics with Python: Gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python
Learning Predictive Analytics with Python: Gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python

Gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python

About This Book

  • A step-by-step guide to predictive modeling including lots of tips, tricks, and best practices
  • Get to grips with the basics of Predictive...
Getting Started with Sensors: Measure the World with Electronics, Arduino, and Raspberry Pi
Getting Started with Sensors: Measure the World with Electronics, Arduino, and Raspberry Pi

To build electronic projects that can sense the physical world, you need to build circuits based around sensors: electronic components that react to physical phenomena by sending an electrical signal. Even with only basic electronic components, you can build useful and educational sensor projects.

But if you incorporate
...

e-Learning and Social Networking Handbook: Resources for Higher Education
e-Learning and Social Networking Handbook: Resources for Higher Education

Student engagement with digital learning resources and online social networking are strong forces in education today. How can these resources best be utilized by educators and course designers in higher education? This book aims to provide the reader with enough background information to appreciate the value of social networking, especially...

Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more

Leverage the power of Python to collect, process, and mine deep insights from social media data

About This Book

  • Acquire data from various social media platforms such as Facebook, Twitter, YouTube, GitHub, and more
  • Analyze and extract actionable insights from your social data using various...
Make: Bluetooth: Bluetooth LE Projects with Arduino, Raspberry Pi, and Smartphones
Make: Bluetooth: Bluetooth LE Projects with Arduino, Raspberry Pi, and Smartphones

This book is where your adventures with Bluetooth LE begin. You'll start your journey by getting familiar with your hardware options: Arduino, BLE modules, computers (including Raspberry Pi!), and mobile phones. From there, you'll write code and wire circuits to connect off-the-shelf sensors, and even go all the way to writing your...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Result Page: 312 311 310 309 308 307 306 305 304 303 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy