DJ 2 (2017) Hindi Dubbed Action Movie Full HD 700 MB | Smf Enclosures | saison 6 complet
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning with Python: A Hands-on Introduction
Deep Learning with Python: A Hands-on Introduction
Discover the practical aspects of implementing deep-learning solutions using the rich Python ecosystem. This book bridges the gap between the academic state-of-the-art and the industry state-of-the-practice by introducing you to deep learning frameworks such as Keras, Theano, and Caffe. The practicalities of these frameworks is often...
Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Unsupervised Learning with R
Unsupervised Learning with R

Work with over 40 packages to draw inferences from complex datasets and find hidden patterns in raw unstructured data

About This Book

  • Unlock and discover how to tackle clusters of raw data through practical examples in R
  • Explore your data and create your own models from scratch
  • ...
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam

This book has been FULLY updated to reflect PMI's changes to the PMP Exam Content Outline dated June 2015, and is intended for all PMP exams taken AFTER November 1st, 2015. If you are taking the PMP exam on or before November 1st of 2015, please contact the Publisher.

Can you imagine valuing a book so much that you...

Android Game Programming by Example
Android Game Programming by Example

Harness the power of the Android SDK by building three immersive and captivating games

About This Book

  • Implement the critical main game loop and structure your games to enable an array of advanced features
  • Animate your characters with sprite sheets, add multiple scrolling parallax...
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)

Printed in full color.

To keep doing what you love, you need to maintain your own systems, not just the ones you write code for. Regular exercise and proper nutrition help you learn, remember, concentrate, and be creative--skills critical to doing your job well. Learn how to change your work habits, master exercises
...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Introduction to Google Analytics: A Guide for Absolute Beginners
Introduction to Google Analytics: A Guide for Absolute Beginners

Develop your digital/online marketing skills and learn web analytics to understand the performance of websites and ad campaigns. Approaches covered will be immediately useful for business or nonprofit organizations. If you are completely new to Google Analytics and you want to learn the basics, this guide will introduce you to the...

Result Page: 194 193 192 191 190 189 188 187 186 185 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy