Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Create your first turn-based multiplayer game using GameMaker Studio 2’s built-in networking functions as well as using a simple NodeJS server. This book introduces you to the complexities of network programming and communication, where the focus will be on building the game from the ground up.  You will...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Fundamentals of Probability: With Stochastic Processes
Fundamentals of Probability: With Stochastic Processes

"The 4th edition of Ghahramani's book is replete with intriguing historical notes, insightful comments, and well-selected examples/exercises that, together, capture much of the essence of probability. Along with its Companion Website, the book is suitable as a primary resource for a first course in probability. Moreover, it...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Digital and Statistical Signal Processing
Digital and Statistical Signal Processing

Nowadays, many aspects of electrical and electronic engineering are essentially applications of DSP. This is due to the focus on processing information in the form of digital signals, using certain DSP hardware designed to execute software. Fundamental topics in digital signal processing are introduced with theory, analytical tables,...

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences
  • ...
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity

Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations

Key Features

  • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin
  • Explore the Solidity programming language and smart contract optimizations
  • ...
TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning
TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning

Learn how to solve challenging machine learning problems with TensorFlow, Google’s revolutionary new software library for deep learning. If you have some background in basic linear algebra and calculus, this practical book introduces machine-learning fundamentals by showing you how to design systems capable of detecting objects...

Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
unlimited object storage image
Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy