|
|
|
|
|
|
Data Science and Complex Networks: Real Case Studies with Python
This book provides a comprehensive yet short description of the basic concepts of Complex Network theory. In contrast to other books the authors present these concepts through real case studies. The application topics span from Foodwebs, to the Internet, the World Wide Web and the Social Networks, passing through the International Trade Web... | | Pivotal Certified Professional Spring Developer Exam: A Study Guide
Pass the Pivotal Certified Professional exam using source code examples, study summaries, and mock exams. In this book, you'll find a descriptive overview of certification-related Spring modules and a single example application demonstrating the use of all required Spring modules. Also, it is suitable as an introductory primer for Spring... | | Swift iOS 24-Hour Trainer
Jump into the app development world with confidence!
iOS Swift 24-Hour Trainer combines book and video lessons in Apple's Swift programming language to prepare you to build iPhone and iPad apps—and distribute them through the Appstore. First, this approachable text covers the fundamentals of Swift by... |
|
Samsung Galaxy S7 For Dummies (For Dummies (Computer/tech))
Your fun and accessible user's guide to the Samsung Galaxy S 7
Technology alone can be intimidating, and the printed documentation and online support that come with a new smartphone can be just as baffling. Thankfully, Samsung Galaxy S 7 For Dummies is here to give you easy-to-follow guidance on all the features... | | THE SILK ROAD ENCYCLOPEDIA
Literary Nonfiction. Asian & Asian American Studies. History. Since the concept of the Silk Road as an avenue of inter- civilizational exchange emerged more than 130 years ago, scholars from both Eastern and Western societies have conducted persistent research to advance the field. Still, however, not nearly enough research has been... | | Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll ... |
|
|
Result Page: Previous 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Next |