Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling

Get to grips with the essentials of deep learning by leveraging the power of Python

Key Features

  • Your one-stop solution to get started with the essentials of deep learning and neural network modeling
  • Train different kinds of neural networks to tackle various problems in...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
LINQ in Action
LINQ in Action
LINQ, Language INtegrated Query, is a new extension to the Visual Basic and C# programming languages designed to simplify data queries and database interaction. It addreses O/R mapping issues by making query operations like SQL statements part of the programming language. It also offers built-in support for querying in-memory collections like...
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV

A practical guide designed to get you from basics to current state of art in computer vision systems.

Key Features

  • Master the different tasks associated with Computer Vision and develop your own Computer Vision applications with ease
  • Leverage the power of Python,...
Result Page: 66 65 64 63 62 61 60 59 58 57 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy