Whose Line is it Anyway US S12E03 HDTV x264-BAJSKORV[ettv] | Fievel en Manhattan | Brian Bell
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a...

A Practical Guide to Data Mining for Business and Industry
A Practical Guide to Data Mining for Business and Industry

Data mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Threat Forecasting: Leveraging Big Data for Predictive Analysis
Threat Forecasting: Leveraging Big Data for Predictive Analysis

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop...

The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)

Printed in full color.

To keep doing what you love, you need to maintain your own systems, not just the ones you write code for. Regular exercise and proper nutrition help you learn, remember, concentrate, and be creative--skills critical to doing your job well. Learn how to change your work habits, master exercises
...

Bayesian Computation with R (Use R)
Bayesian Computation with R (Use R)
The book is a concise presentation of a wide range of Bayesian inferential problems and the computational methods to solve them. The detailed and thorough presentation style, with complete R code for the examples, makes it a welcome companion to a theoretical text on Bayesian inference.... Smart students of statistics will want to have both R and...
Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)
Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)

This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX techniques, such as water, fire, smoke, and wind, has been proven through active involvement and utilization in movies and images. However, they have yet to be extensively applied in the game...

Refactoring to Agility
Refactoring to Agility

Agile methodologies, such as XP, Scrum, Crystal, and Lean Software Development enable development organizations to deliver higher-quality software far more rapidly. However, for the "non-agile" development organization, transitioning to agility is an enormous leap, requiring radically new skills and presenting profound...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Parallel Algorithm Derivation and Program Transformation
Parallel Algorithm Derivation and Program Transformation
Transformational programming and parallel computation are two emerging fields that may ultimately depend on each other for success. Perhaps because ad hoc programming on sequential machines is so straightforward, sequential programming methodology has had little impact outside the academic community, and transformational methodology has had little...
Swarm Intelligence (The Morgan Kaufmann Series in Evolutionary Computation)
Swarm Intelligence (The Morgan Kaufmann Series in Evolutionary Computation)

Traditional methods for creating intelligent computational systems have privileged private "internal" cognitive and computational processes. In contrast, Swarm Intelligence argues that human intelligence derives from the interactions of individuals in a social world and further, that this model of...

Agile Data Science: Building Data Analytics Applications with Hadoop
Agile Data Science: Building Data Analytics Applications with Hadoop

Mining big data requires a deep investment in people and time. How can you be sure you’re building the right models? With this hands-on book, you’ll learn a flexible toolset and methodology for building effective analytics applications with Hadoop.

Using lightweight tools such as Python, Apache Pig, and the...

Result Page: 76 75 74 73 72 71 70 69 68 67 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy