Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

C# Game Programming Cookbook for Unity 3D
C# Game Programming Cookbook for Unity 3D

This second edition of C# Game Programming Cookbook for Unity 3D expounds upon the first with more details and techniques. With a fresh array of chapters, updated C# code and examples, Jeff W. Murray’s book will help the reader understand structured game development in Unity unlike ever before.

New to this...

Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python

Develop real-world applications powered by the latest advances in intelligent systems

Key Features

  • Gain real-world contextualization using deep learning problems concerning research and application
  • Get to know the best practices to improve and optimize your machine...
Show Me You Care - The Power of Silence in Selling
Show Me You Care - The Power of Silence in Selling

The Power of Silence is immense.

Nothing establishes a closer connection or works better than silence and active listening. There is raw power to listening, hearing, and getting out of the way. When we let a buyer tell us what they want, vs. what we think they may need, long-lasting relationships are built. Silence and...

Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
CRISPR Guide RNA Design: Methods and Protocols (Methods in Molecular Biology, 2162)
CRISPR Guide RNA Design: Methods and Protocols (Methods in Molecular Biology, 2162)
This detailed volume focuses on the CRISPR-associated guide RNA and how it can be designed, modified, and validated for a broad repertoire of purposes. Beginning with a section on computational design of target-specific guide RNAs, the book continues by covering chemical modifications to alter guide RNA stability, specificity, and...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)

“If you’re writing a native Win32 program or just want to know what the OS is really doing underneath, you need John’s book. He covers the stuff that real systems programmers absolutely must know. Recommended.”

–Chris Sells, Microsoft Corporation

...
Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
In biological and medical imaging applications, tracking objects in motion is a critical task. This book describes the state-of-the-art in biomedical tracking techniques. We begin by detailing methods for tracking using active contours, which have been highly successful in biomedical applications. The book next covers the major probabilistic...
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript

Learn how to write cross platform React Native code by using effective design patterns in the JavaScript world. Get to know industry standard patterns as well as situational patterns. Decouple your application with these set of “Idea patterns”.

Key Features

  • Mobile development...
unlimited object storage image
Result Page: 61 60 59 58 57 56 55 54 53 52 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy