 |
|
|
 Python Data Analytics: With Pandas, NumPy, and Matplotlib
Explore the latest Python tools and techniques to help you tackle the world of data acquisition and analysis. You'll review scientific computing with NumPy, visualization with matplotlib, and machine learning with scikit-learn.
This revision is fully updated with new content on social media data analysis, image ... |  |  |  |  Investigative Data Mining for Security and Criminal Detection, First EditionInvestigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest... |
|
 Writing Scientific Software: A Guide to Good StyleThe core of scientific computing is designing, writing, testing, debugging and modifying numerical software for application to a vast range of areas: from graphics, meteorology and chemistry to engineering, biology and finance. Scientists, engineers and computer scientists need to write good code, for speed, clarity, flexibility and ease of re-use.... |  |  |  |  |
|
 Protected: Internet, Intranet, & Virtual Private NetworksA systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web... |  |  LDAP Programming, Management, and IntegrationFocusing on the practical application of the Lightweight Directory Access Protocol, this tutorial is geared toward IS professionals and software developers who are responsible for getting the maximum potential from their directories by integrating them with existing processes and applications. As the Internet standard for directory services, LDAP... |  |  Security in Computing (4th Edition)The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security
For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information... |
|
Result Page: 729 728 727 726 725 724 723 722 721 720 |