Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Architects of Intelligence: The truth about AI from the people building it
Architects of Intelligence: The truth about AI from the people building it

Financial Times Best Books of the Year 2018

TechRepublic Top Books Every Techie Should Read

Book Description

How will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level...

Storage Networks: The Complete Reference
Storage Networks: The Complete Reference
This comprehensive guide helps you stay on top of storage networking innovations while understanding the realities of storage networks in the data center. Use the essential concepts of storage networks including architecture, devices, connectivity options, and data organization methods to design and apply comprehensive and successful storage...
Ansi/Iso C++ Professional Programmer's Handbook (Que Professional Series)
Ansi/Iso C++ Professional Programmer's Handbook (Que Professional Series)
By that time, hundreds of thousands of people were using the language. C++ compilers were available
for almost every platform. New C++-based frameworks, such as MFC and OWL, had emerged. The
committee had to face enormous pressure from several directions. Some organizations were advocating
new features and extensions to the language
...
Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
The perfect study companion for UNIX system professionals preparing for both Solaris 8 System Administrator exams. The book contains accurate and efficient coverage of the many new features of the Solaris 8 system including new support for Ipv6, LDAP, and DHCP, installs using Solaris Web Start, new Universal Disk Format (UDF) file system support,...
Chess For Dummies
Chess For Dummies
It was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real...
Film Production Theory (The Suny Series, Cultural Studies in Cinema/Video)
Film Production Theory (The Suny Series, Cultural Studies in Cinema/Video)
To all appearances, the business of cinema goes on as usual. Yes, movies are being made. The production lines in the studios keep churning out their images. The digital effects specialists stay up late at night to meet endless deadlines. Films open in Berlin or Cannes. Critics write their reviews. People talk about the latest releases at work or...
Pro Drupal 7 Development
Pro Drupal 7 Development

In its relatively short life, Drupal has had a tremendous impact on the landscape of the Internet. As a web content management system, Drupal has enabled the creation of feature- and content-rich web sites for organizations large and small. As a web application framework, Drupal is changing the way that people think about web application...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

Determining Project Requirements (ESI International Project Mgmt)
Determining Project Requirements (ESI International Project Mgmt)

Organizations waste millions of dollars every year on failed projects. Failure is practically guaranteed by poor or incomplete requirements that do not properly define projects in their initial stages.  Business analysis is the critical process ensuring projects start on the path toward success. To accurately determine project...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

unlimited object storage image
Result Page: 277 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy