Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention

Turn unstructured data into valuable business insight

Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...

Intro to Java Programming, Comprehensive Version (10th Edition)
100 Weekend Projects Anyone Can Do: Easy, practical projects using basic tools and standard materials
100 Weekend Projects Anyone Can Do: Easy, practical projects using basic tools and standard materials

100 do-it-yourself simple projects, requiring only basic tools, precut lumber and standard materials.

Build fashionable, functional, inexpensive indoor and backyard furniture—even if you're a complete beginner. These are realistic projects for the average weekend warrior that require no great skills, just normal
...

Working with Linux – Quick Hacks for the Command Line
Working with Linux – Quick Hacks for the Command Line

Key Features

  • Improve your terminal and command-line productivity by using powerful tools
  • Sharpen your existing command-line skills and achieve complex tasks faster
  • Save time and money by creating customized commands that automate day-to-day tasks

Book Description

...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Predictive Analytics with Microsoft Azure Machine Learning: Build and Deploy Actionable Solutions in Minutes
Predictive Analytics with Microsoft Azure Machine Learning: Build and Deploy Actionable Solutions in Minutes

Data Science and Machine Learning are in high demand, as customers are increasingly looking for ways to glean insights from all their data. More customers now realize that Business Intelligence is not enough as the volume, speed and complexity of data now defy traditional analytics tools. While Business Intelligence addresses descriptive and...

Practical Antenna Handbook
Practical Antenna Handbook
The Antenna Builder’s Bible – Updated and Better Than Ever!

Design and construct your own antennas with step-by-step instructions and plans. Joseph J. Carr’s Practical Antenna Handbook, Fourth Edition, is an update of the most popular book on antennas ever written. This empowering guide blends theoretical concepts that...

Spark for Python Developers
Spark for Python Developers

Key Features

  • Set up real-time streaming and batch data intensive infrastructure using Spark and Python
  • Deliver insightful visualizations in a web app using Spark (PySpark)
  • Inject live data using Spark Streaming with real-time events

Book Description

Looking...

Phenomenology of Space and Time: The Forces of the Cosmos and the Ontopoietic Genesis of Life: Book Two (Analecta Husserliana)
Phenomenology of Space and Time: The Forces of the Cosmos and the Ontopoietic Genesis of Life: Book Two (Analecta Husserliana)

This work celebrates the investigative power of phenomenology to explore the phenomenological sense of space and time in conjunction with the phenomenology of intentionality, the invisible, the sacred, and the mystical. It examines the course of life through its ontopoietic genesis, opening the cosmic sphere to logos. The work also explores,...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Roof Construction and Loft Conversion
Roof Construction and Loft Conversion

"A thorough rundown of the various types of roof currently in use, with easy -to-read diagrams to make sense of it all … particularly useful if you have a tricky space to convert." (Build It, December 2008)

"easy to read and concise … an excellent book" (Building Engineer)...

Result Page: 106 105 104 103 102 101 100 99 98 97 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy