Movie Trailer Ellen Page | WWE Straight to the Source S01E03 | El Payaso del Mal
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners (Wiley and SAS Business Series)
Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners (Wiley and SAS Business Series)

With big data analytics comes big insights intoprofitability

Big data is big business. But having the data and thecomputational power to process it isn't nearly enough to producemeaningful results. Big Data, Data Mining, and Machine Learning:Value Creation for Business Leaders and Practitioners is acomplete...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Learning Python Testing
Learning Python Testing

A straightforward and easy approach to testing your Python projects

About This Book

  • Develop your knowledge and skills to increase your confidence in tackling new challenges
  • Guides you through the tools of automated testing in Python 3 with practical and real-life examples
  • ...
Microservices: Flexible Software Architecture
Microservices: Flexible Software Architecture

The Most Complete, Practical, and Actionable Guide to Microservices

 

Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates...

The LEGO MINDSTORMS EV3 Laboratory: Build, Program, and Experiment with Five Wicked Cool Robots
The LEGO MINDSTORMS EV3 Laboratory: Build, Program, and Experiment with Five Wicked Cool Robots

The LEGO® MINDSTORMS® EV3 set offers so many new and exciting features that it can be hard to know where to begin. Without the help of an expert, it could take months of experimentation to learn how to use the advanced mechanisms and numerous programming features.

In The LEGO MINDSTORMS EV3 Laboratory, author
...

WordPress 24-Hour Trainer
WordPress 24-Hour Trainer

The easy, self-paced guide to the powerful WordPress platform WordPress 24-Hour Trainer, 3rd Edition provides a comprehensive, unique book-and-video package that focuses on the practical, everyday tasks you will face when creating and maintaining WordPress websites.

This easy-to-use, friendly guide will show you how to create
...

Start Here! Fundamentals of Microsoft .NET Programming
Start Here! Fundamentals of Microsoft .NET Programming

Grasp the basic concepts that drive all Microsoft® .NET-based languages—and prepare yourself to learn .NET programming. If you have absolutely no previous experience, no problem—simply start here! This ebook provides the foundation for all other .NET programming language books in the Start Here! series....

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Refactoring to Agility
Refactoring to Agility

Agile methodologies, such as XP, Scrum, Crystal, and Lean Software Development enable development organizations to deliver higher-quality software far more rapidly. However, for the "non-agile" development organization, transitioning to agility is an enormous leap, requiring radically new skills and presenting profound...

Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)
Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)

New sequencing technologies have broken many experimental barriers to genome scale sequencing, leading to the extraction of huge quantities of sequence data. This expansion of biological databases established the need for new ways to harness and apply the astounding amount of available genomic information and convert it into substantive...

Learn to Program, Second Edition (The Facets of Ruby Series)
Learn to Program, Second Edition (The Facets of Ruby Series)

Printed in full color.

For this new edition of the best-selling Learn to Program, Chris Pine has taken a good thing and made it even better. First, he used the feedback from hundreds of reader e-mails to update the content and make it even clearer. Second, he updated the examples in the book to use the latest
...

Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Result Page: 60 59 58 57 56 55 54 53 52 51 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy