Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Convolutional Neural Networks: Implement advanced deep learning models using Python
Practical Convolutional Neural Networks: Implement advanced deep learning models using Python

One stop guide to implementing award-winning, and cutting-edge CNN architectures

Key Features

  • Fast-paced guide with use cases and real-world examples to get well versed with CNN techniques
  • Implement CNN models on image classification, transfer learning, Object Detection,...
Go Web Development Cookbook: Build full-stack web applications with Go
Go Web Development Cookbook: Build full-stack web applications with Go

86 recipes on how to build fast, scalable, and powerful web services and applications with Go

Key Features

  • Become proficient in RESTful web services
  • Build scalable, high-performant web applications in Go
  • Get acquainted with Go frameworks for web...
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity

Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations

Key Features

  • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin
  • Explore the Solidity programming language and smart contract optimizations
  • ...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Python Data Science Essentials: A practitioner's guide covering essential data science principles, tools, and techniques, 3rd Edition
Python Data Science Essentials: A practitioner's guide covering essential data science principles, tools, and techniques, 3rd Edition

Gain useful insights from your data using popular data science tools

Key Features

  • A one-stop guide to Python libraries such as pandas and NumPy
  • Comprehensive coverage of data science operations such as data cleaning and data manipulation
  • Choose scalable...
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale

Highly available microservice-based web apps for Cloud with Java

Key Features

  • Take advantage of the simplicity of Spring to build a full-fledged application
  • Let your applications run faster while generating smaller cloud service bills
  • Integrate your...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling

Get to grips with the essentials of deep learning by leveraging the power of Python

Key Features

  • Your one-stop solution to get started with the essentials of deep learning and neural network modeling
  • Train different kinds of neural networks to tackle various problems in...
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy