Running Man Episode 350 | Luke Cage - Tráiler #2 (Netflix) | Dramat / Obyczajowy
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Artificial Intelligence for Humans, Volume 3: Deep Learning and Neural Networks
Artificial Intelligence for Humans, Volume 3: Deep Learning and Neural Networks

Neural networks have been a mainstay of artificial intelligence since its earliest days. Now, exciting new technologies such as deep learning and convolution are taking neural networks in bold new directions. In this book, we will demonstrate the neural networks in a variety of real-world tasks such as image recognition and data science. We...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Advanced Analytics with Spark: Patterns for Learning from Data at Scale
Advanced Analytics with Spark: Patterns for Learning from Data at Scale

In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.

You’ll start with an...

Optimized C++: Proven Techniques for Heightened Performance
Optimized C++: Proven Techniques for Heightened Performance

In today’s fast and competitive world, a program’s performance is just as important to customers as the features it provides. This practical guide teaches developers performance-tuning principles that enable optimization in C++. You’ll learn how to make code that already embodies best practices of C++ design run...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Red Hat Enterprise Linux Server Cookbook
Red Hat Enterprise Linux Server Cookbook

Key Features

  • Create fully unattended installations and deploy configurations without breaking a sweat
  • Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
  • Be guided by an experienced RHEL...
Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.

...
Python Geospatial Analysis Cookbook
Python Geospatial Analysis Cookbook

Over 60 recipes to work with topology, overlays, indoor routing, and web application analysis with Python

About This Book

  • Explore the practical process of using geospatial analysis to solve simple to complex problems with reusable recipes
  • Concise step-by-step instructions to teach you...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Result Page: 343 342 341 340 339 338 337 336 335 334 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy