Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras

Explore various Generative Adversarial Network architectures using the Python ecosystem

Key Features

  • Use different datasets to build advanced projects in the Generative Adversarial Network domain
  • Implement projects ranging from generating 3D shapes to a face aging...
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
The Calculus of Computation: Decision Procedures with Applications to Verification
The Calculus of Computation: Decision Procedures with Applications to Verification
Computational logic is a fast-growing field with applications in artificial intelligence, constraint solving, and the design and verification of software and hardware systems. Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art...
Quantum Circuit Simulation
Quantum Circuit Simulation

Quantum Circuit Simulation covers the fundamentals of linear algebra and introduces basic concepts of quantum physics needed to understand quantum circuits and algorithms. It requires only basic familiarity with algebra, graph algorithms and computer engineering. After introducing necessary background, the authors describe key simulation...

Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

A Distributed Pi-Calculus
A Distributed Pi-Calculus
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the...
Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)
Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)

This Festschrift volume, published in memory of Harald Ganzinger, contains 17 papers from colleagues all over the world and covers all the fields to which Harald Ganzinger dedicated his work during his academic career. The volume begins with a complete account of Harald Ganzinger's work and then turns its focus to the research of his...

Fundamentals of Probability and Statistics for Engineers
Fundamentals of Probability and Statistics for Engineers
This book was written for an introductory one-semester or two-quarter course in probability and statistics for students in engineering and applied sciences. No previous knowledge of probability or statistics is presumed but a good understanding of calculus is a prerequisite for the material.

The development of this book was guided by a
...
CMOS Sigma-Delta Converters: Practical Design Guide
CMOS Sigma-Delta Converters: Practical Design Guide

A comprehensive overview of Sigma-Delta Analog-to-Digital Converters (ADCs) and a practical guide to their design in nano-scale CMOS for optimal performance.

This book presents a systematic and comprehensive compilation of sigma-delta converter operating principles, the new advances in architectures and circuits, design...

Result Page: 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy