Amended (2017) | Naff Ketika Semua Harus Berakhir | Radio Star Episode 565
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
INNOVATION, CULTURE, AND BIG DATA ANALYTICS
 
Ignoring the big data hype and diving right into the value proposition, Big Data, Big Innovation takes a long, hard look at making sure that businesses don't stray off course when chasing innovation. It focuses on real-world goals, strategies...
Unity Virtual Reality Projects: Explore the world of virtual reality by building immersive and fun VR projects using Unity 3D
Unity Virtual Reality Projects: Explore the world of virtual reality by building immersive and fun VR projects using Unity 3D

Explore the world of Virtual Reality by building immersive and fun VR projects using Unity 3D

Key Features

  • Learn the basic principles of virtual reality applications and get to know how they differ from games and desktop apps
  • Build various types of VR experiences, including diorama,...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Building Microservices
Building Microservices

Distributed systems have become more fine-grained in the past 10 years, shifting from code-heavy monolithic applications to smaller, self-contained microservices. But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system...

Hands-On Programming with R: Write Your Own Functions and Simulations
Hands-On Programming with R: Write Your Own Functions and Simulations

Learn how to program by diving into the R language, and then use your newfound skills to solve practical data science problems. With this book, you’ll learn how to load data, assemble and disassemble data objects, navigate R’s environment system, write your own functions, and use all of R’s programming tools.

...
Blender 2.6 Cycles:Materials and Textures Cookbook
Blender 2.6 Cycles:Materials and Textures Cookbook

With this book you'll be able to explore and master all that the Cycles rendering engine is capable of. From the basics right through to refining, this is a must-read if you're serious about the realism of your materials and textures.

Overview

  • Create naturalistic materials and textures - such as...
Relativity (Routledge Classics)
Relativity (Routledge Classics)

How better to learn the Special Theory of Relativity and the General Theory of Relativity than directly from their creator, Albert Einstein himself? In Relativity: The Special and the General Theory, Einstein describes the theories that made him famous, illuminating his case with numerous examples and a smattering of math (nothing more...

Using ArcGIS Spatial Analyst
Using ArcGIS Spatial Analyst
This book is designed ti help you performs spatial analysis by diving you conceptual information and teaching you how to perform tasks to solve yuor spatial problems.
  • assume you are familiar with the fundamentals of GIS and have a basic knowledge of ArcGIS. If  you are new to GIS or ArcMap, you are encouraged to take some...
Geocaching: Hike and Seek with Your GPS (Technology in Action Series)
Geocaching: Hike and Seek with Your GPS (Technology in Action Series)
It isn't often that you witness the birth of a new sport or game. I'm not referring to some variation on a theme, like snowboarding on your hands, or to one of the prepackaged amusements that erupt like a volcano of marketing froth during the holiday seasons, but a real game-one that catches the imagination and quickly...
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
OCA / OCP Java SE 8 Programmer Practice Tests
OCA / OCP Java SE 8 Programmer Practice Tests

Test your knowledge and prepare for the OCA/OCP exams

OCA/OCP Java SE 8 Programmer Practice Tests complements the Sybex OCA: Oracle Certified Associate Java SE 8 Programmer I Certification Study Guide and the OCP: Oracle Certified Professional Java SE 8 Programmer II Study Guide for exams 1Z0-808 and...

Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy