Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Data Analysis
Practical Data Analysis

Transform, model, and visualize your data through hands-on projects, developed in open source tools

Overview

  • Explore how to analyze your data in various innovative ways and turn them into insight
  • Learn to use the D3.js visualization tool for exploratory data analysis
  • ...
iOS 6 Recipes: A Problem-Solution Approach
iOS 6 Recipes: A Problem-Solution Approach

iOS 6 Recipes: A Problem-Solution Approach is your code reference and guide to developing solutions on iPad, iPhone, and other iOS 6 SDK devices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You'll find numerous examples of real-world cases...

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Mastering Wireshark
Mastering Wireshark

Key Features

  • Master Wireshark and train it as your network sniffer
  • Impress your peers and get yourself pronounced as a network doctor
  • Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network...
The Ultimate Digital Music Guide: The Best Way to Store, Organize, and Play Digital Music
The Ultimate Digital Music Guide: The Best Way to Store, Organize, and Play Digital Music

Iam a music lover. Big time. My wife and I try to catch at least one or two major shows a month, and I’m an “A Train” member of and frequent visitor to our local jazz club. (That’s the Dakota Jazz Club in Minneapolis, one of the best in the nation.) I have more than 1,700 albums in my music collection, or more than...

Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras

Implement machine learning and deep learning methodologies to build smart, cognitive AI projects using Python

Key Features

  • A go-to guide to help you master AI algorithms and concepts
  • 8 real-world projects tackling different challenges in healthcare, e-commerce, and...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
CodeIgniter Web Application Blueprints
CodeIgniter Web Application Blueprints

Develop full-featured dynamic web applications using the powerful CodeIgniter MVC framework

About This Book

  • Create your own dynamic web application using wireframes, databases, and language files
  • Develop unique applications to perform simple tasks, such as authorizing users, sharing...
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Building Python Real-Time Applications with Storm
Building Python Real-Time Applications with Storm

Learn to process massive real-time data streams using Storm and Python―no Java required!

About This Book

  • Learn to use Apache Storm and the Python Petrel library to build distributed applications that process large streams of data
  • Explore sample applications in real-time and analyze...
Magento Mobile How-To
Magento Mobile How-To

Create and configure your own Magento Mobile application and publish it for the Android and iOS platforms

Overview

  • Style and theme your Magento Mobile Application interface
  • Configure Product categories and add static content for mobile
  • Prepare and publish your Magento mobile...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy