Paul Sherman | Hailey Clearwater | Feuer und Blut Fire and Blood
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
'Lets Do Java
'Lets Do Java
The underlying theme of this course is that Java is a highly portable programming language and is able to run on a very wide range of platforms.

This means that Java software may be required to run on very small scale systems with few resources, such as very limited storage or very small displays, as well as on large networks
...
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

DarkMarket: Cyberthieves, Cybercops and You
DarkMarket: Cyberthieves, Cybercops and You

"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." --Roberto Saviano, author of Gommorah

The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a
...

Nature Inspired Cooperative Strategies for Optimization (NICSO 2013): Learning, Optimization and Interdisciplinary Applications
Nature Inspired Cooperative Strategies for Optimization (NICSO 2013): Learning, Optimization and Interdisciplinary Applications

Biological and other natural processes have always been a source of inspiration for computer science and information technology. Many emerging problem solving techniques integrate advanced evolution and cooperation strategies, encompassing a range of spatio-temporal scales for visionary conceptualization of evolutionary computation.

...

Twisted Network Programming Essentials
Twisted Network Programming Essentials

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using...

Mastering Oracle Scheduler in Oracle 11g Databases
Mastering Oracle Scheduler in Oracle 11g Databases

Scheduler (DBMS_SCHEDULER) is included in Oracle Database and is a tool for the automation, management, and control of jobs. It enables users to schedule jobs running inside the database such as PL/SQL procedures or PL/SQL blocks, as well as jobs running outside the database like shell scripts. Scheduler ensures that jobs are run on time,...

Computational Intelligence: Engineering of Hybrid Systems
Computational Intelligence: Engineering of Hybrid Systems

Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms –...

BioMEMS and Biomedical Nanotechnology
BioMEMS and Biomedical Nanotechnology
Numerous miniaturized DNA microarray, DNA chip, Lab on a Chip and biosensor devices have been developed and commercialized. Such devices are improving theway many important genomic and proteomic analyses are performed in both research and clinical diagnostic laboratories. The development of these technologies was enabled by a...
Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Adaptive Business Intelligence
Adaptive Business Intelligence
From the reviews of the first edition: 

"In this book the authors explain the science and application of numerous prediction and optimization techniques as well as how these concepts can be used to develop adaptive decision-making systems. The book is suitable for business and IT managers who make decisions in complex industrial and...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy