Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics

Key Features

  • This easy-to-follow guide takes you through every step of the data wrangling process in the best possible way
  • Work with different types of datasets, and reshape the layout of your data to make it easier for analysis
  • Get simple examples and real-life data...
Lean Python: Learn Just Enough Python to Build Useful Tools
Lean Python: Learn Just Enough Python to Build Useful Tools

Learn only the essential aspects of Python without cluttering up your mind with features you may never use. This compact book is not a "best way to write code" type of book; rather, the author goes over his most-used functions, which are all you need to know as a beginner and some way beyond.

Lean...

Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.

In DevOps for Digital Leaders, deep collective experience on both...
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook

Key Features

  • Build highly efficient distributed applications with ease
  • Enhance your cross-platform network programming skills with one of the most reputable C++ libraries
  • Find solutions to real-world problems related to network programming with ready-to-use recipes using this...
Applied Engineering Failure Analysis: Theory and Practice
Applied Engineering Failure Analysis: Theory and Practice

Applied Engineering Failure Analysis: Theory and Practice provides a point of reference for engineering failure analysis (EFA) cases, presenting a compilation of case studies covering a 35-year period, from the 1970s to 2012. This period spans the era from the time when slide rules were used routinely for...

Result Page: 365 364 363 362 361 360 359 358 357 356 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy