China IL | US Billboard Hot 100 Single Charts | Assistir Online The Originals S05E06 – 5×06 – Legendado
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Red Hat Enterprise Linux Server Cookbook
Red Hat Enterprise Linux Server Cookbook

Key Features

  • Create fully unattended installations and deploy configurations without breaking a sweat
  • Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
  • Be guided by an experienced RHEL...
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black

This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Introducing Linux Distros
Introducing Linux Distros

Learn the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon installation guides....

Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
Business Intelligence Tools for Small Companies: A Guide to Free and Low-Cost Solutions
Business Intelligence Tools for Small Companies: A Guide to Free and Low-Cost Solutions

Learn how to transition from Excel-based business intelligence (BI) analysis to enterprise stacks of open-source BI tools. Select and implement the best free and freemium open-source BI tools for your company’s needs and design, implement, and integrate BI automation across the full stack using agile methodologies.

...

Event-Driven Programming
Event-Driven Programming
The previous unit, Unit 6, has shown you how to create graphical user interfaces that contain a wide range of components and have quite sophisticated layouts. You are also in a position now to make use of Java reference material to investigate and use other components and layouts. However, when the user clicks on a button or enters text, nothing...
OpenStack in Action
OpenStack in Action

Summary

OpenStack in Action offers the real world use cases and step-by-step instructions you can take to develop your own cloud platform from from inception to deployment. This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need to create a...

iOS 9 Application Development in 24 Hours, Sams Teach Yourself (7th Edition)
iOS 9 Application Development in 24 Hours, Sams Teach Yourself (7th Edition)

Covers iOS 9.1 and up, Xcode 7.x, iPhone, iPad, and More!

In just 24 sessions of one hour each, learn how to build powerful applications for today’s hottest handheld devices: the iPhone and iPad! Using this book’s straightforward, step-by-step approach, you’ll master every skill and technology you
...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Pro Spring 5: An In-Depth Guide to the Spring Framework and Its Tools
Pro Spring 5: An In-Depth Guide to the Spring Framework and Its Tools

Master Spring basics and core topics, and share the authors’ insights and real–world experiences with remoting, Hibernate, and EJB. Beyond the basics, you'll learn how to leverage the Spring Framework to build the various tiers and parts of an enterprise Java application: transactions, web and presentation tiers, deployment,...

Result Page: 245 244 243 242 241 240 239 238 237 236 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy