Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning Cookbook: Practical Recipes to Get Started Quickly
Deep Learning Cookbook: Practical Recipes to Get Started Quickly

Deep learning doesn’t have to be intimidating. Until recently, this machine-learning method required years of study, but with frameworks such as Keras and Tensorflow, software engineers without a background in machine learning can quickly enter the field. With the recipes in this cookbook, you’ll learn how to solve...

Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems

Graphics in this book are printed in black and white.

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data....

Web Design with HTML and CSS Digital Classroom, (Book and Video Training)
Web Design with HTML and CSS Digital Classroom, (Book and Video Training)

"An invaluable full-color training package for Web design

Web design consists of using multiple software tools and codes-such as Dreamweaver, Flash, Silverlight, Illustrator, Photoshop, HTML, and CSS, among others-to craft a unique, robust, and interactive websites. This book teaches you how to effectively use all the major...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Beginning C# Object-Oriented Programming
Beginning C# Object-Oriented Programming
It has been my experience as a .NET trainer and lead programmer that most people do not have trouble picking up the syntax of the C# language. What perplexes and frustrates many people are the higher-level concepts of object-oriented programming methodology and design. To compound the problem, most introductory programming books and...
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Accounting for beginners
Accounting for beginners

Basic accounting skills are necessary tools when dealing with finances. Understanding the basic concepts and methods used in accounting is critical for developing organizational skills. This e-Book will help guide you into this fascinating...

Introduction to Machine Learning with R: Rigorous Mathematical Analysis
Introduction to Machine Learning with R: Rigorous Mathematical Analysis

Machine learning is an intimidating subject until you know the fundamentals. If you understand basic coding concepts, this introductory guide will help you gain a solid foundation in machine learning principles. Using the R programming language, you’ll first start to learn with regression modelling and then move into more...

OOP Demystified: A Self-Teaching Guide
OOP Demystified: A Self-Teaching Guide

Want to learn about object-oriented programming quickly and easily? Looking to brush up on modeling, classes, and attributes? Then OOP Demystified is the easy-to-understand, step-by-step guidebook that will help you figure out the ins and outs of object-oriented programming (OOP).

Written for anyone without formal training in...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Result Page: 188 187 186 185 184 183 182 181 180 179 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy