1x849 One Piece | Ian Colletti | 1x12 Violet Evergarden
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Automate the Boring Stuff with Python: Practical Programming for Total Beginners

If you’ve ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you?

In Automate the Boring Stuff with Python, you’ll learn how to use Python to write programs that do in minutes what
...

Disruptive Possibilities: How Big Data Changes Everything
Disruptive Possibilities: How Big Data Changes Everything

Big data has more disruptive potential than any information technology developed in the past 40 years. As author Jeffrey Needham points out in this revealing book, big data can provide unprecedented visibility into the operational efficiency of enterprises and agencies.

Disruptive Possibilities provides an...

Java Persistence with Hibernate
Java Persistence with Hibernate

Summary

Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR...

Ionic in Action: Hybrid Mobile Apps with Ionic and AngularJS
Ionic in Action: Hybrid Mobile Apps with Ionic and AngularJS

Summary

Ionic in Action teaches web developers how to build cross-platform...

Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World

Build a working knowledge of data modeling concepts and best practices, along with how to apply these principles with ER/Studio. This second edition includes numerous updates and new sections including an overview of ER/Studio's support for agile development, as well as a description of some of ER/Studio's newer features for NoSQL,...

Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset

Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.

As Big Data Made Easy: A Working...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Using SQLite
Using SQLite

Application developers, take note: databases aren't just for the IS group any more. You can build database-backed applications for the desktop, Web, embedded systems, or operating systems without linking to heavy-duty client-server databases such as Oracle and MySQL. This book shows you how to use SQLite, a small and lightweight...

Kivy: Interactive Applications in Python - Second Edition
Kivy: Interactive Applications in Python - Second Edition

Create responsive cross-platform UI/UX applications and games in Python using the open source Kivy library

About This Book

  • Utilize the power of Kivy to develop applications that run on all the major platforms
  • Build user interfaces (UI) and control multi-touch events to improve the user...
Threat Forecasting: Leveraging Big Data for Predictive Analysis
Threat Forecasting: Leveraging Big Data for Predictive Analysis

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Programming in Lua
Programming in Lua

Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. Lua also has established itself as...

Result Page: 92 91 90 89 88 87 86 85 84 83 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy