Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming
Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming

A definitive guide to mastering and implementing concurrency patterns in your applications

Key Features

  • Build scalable apps with patterns in multithreading, synchronization, and functional programming
  • Explore the parallel programming and multithreading techniques to make...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)

This book presents the proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018), held on August 26-30, 2018, in Florence, Italy. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including...

Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

Understand the nuts and bolts of Blockchain, its different flavors with simple use cases, and cryptographic fundamentals. You will also learn some design considerations that can help you build custom solutions.

Beginning Blockchain is a beginner’s guide to understanding the core concepts of...

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques
Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques

Build next-generation artificial intelligence systems with Java

Key Features

  • Implement AI techniques to build smart applications using Deeplearning4j
  • Perform big data analytics to derive quality insights using Spark MLlib
  • Create self-learning systems using...
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras

Dive deeper into neural networks and get your models trained, optimized with this quick reference guide

Key Features

  • A quick reference to all important deep learning concepts and their implementations
  • Essential tips, tricks, and hacks to train a variety of deep learning...
Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python
Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python

Simplified Python programming for Bitcoin and blockchain

Key Features

  • Build Bitcoin applications in Python with the help of simple examples
  • Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots
  • Analyze Bitcoin...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Hybrid Massive MIMO Precoding in Cloud-RAN (Wireless Networks)
Hybrid Massive MIMO Precoding in Cloud-RAN (Wireless Networks)

This book covers the design and optimization of hybrid RF-baseband precoding for massive multiple-input multiple-output (MIMO)-enabled cloud radio access networks (RANs), where use cases such as millimeter-wave wireless backhauling, fully-loaded cellular networks are of interest. The suitability and practical implementation of the...

Mastering Arduino: A project-based approach to electronics, circuits, and programming
Mastering Arduino: A project-based approach to electronics, circuits, and programming

Mastering Arduino is a practical, no-nonsense guide that will teach you the electronics and programming skills that you need to create advanced Arduino projects.

Key Features

  • Covers enough electronics and code for users at any level
  • Includes complete circuit diagrams for...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Result Page: Previous 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy