 |
|
 Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Machine Learning for Hackers
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract insight
from a record of the... |  |  iPhone User Interface Cookbook
The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to
a new "App" economy, with developers racing to the platform. Mobile touch-centric interfaces
vary greatly from traditional computing platforms, and programmers as well as designers must
learn to adapt to the new form-factor.
... |
|
|
|
 |  |  Web2py Enterprise Web Framework, 2nd Ed
I am guilty! After publicly complaining about the existence of too many
Python based web frameworks, after praising the merits of Django, Pylons,
TurboGears, CherryPy, and web.py, after having used them professionally
and taught them in University level courses, I could not resist and created one
more: web2py.
Why did I... |  |  How To Think Like A Computer Scientist: C++ Version
The goal of this book is to teach you to think like a computer scientist. 1 like
the way computer scientists think because they combine some of the best fea
tures of Mathematics, Engineering, and Natural Science. Like mathematicians,
computer scientists use formal languages to denote ideas (specifically computa
tions). Like engineers,... |
|
| Result Page: 181 180 179 178 177 176 175 174 173 172 171 170 169 168 |