Download | Clay Shirky | 最优的我们
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Science Illuminated
Computer Science Illuminated

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Fully revised and updated, the Sixth Edition of the best-selling text Computer Science
...

Python Requests Essentials
Python Requests Essentials

Learn how to integrate your applications seamlessly with web services using Python Requests

About This Book

  • A fast-paced guide that demonstrates the use of Python Requests with the help of examples
  • Learn web scraping with Beautiful Soup and Python Requests libraries
  • ...
Data Analysis Using SQL and Excel
Data Analysis Using SQL and Excel

A practical guide to data mining using SQL and Excel

Data Analysis Using SQL and Excel, 2nd Edition shows youhow to leverage the two most popular tools for data query andanalysis—SQL and Excel—to perform sophisticated dataanalysis without the need for complex and expensive data miningtools. Written by a...

Node.js in Action
Node.js in Action

Summary

Node.js in Action is an example-driven tutorial that starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. You'll start by learning how to set up your Node development environment, including loading...

Building a BeagleBone Black Super Cluster
Building a BeagleBone Black Super Cluster

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This Book

  • Configure your own cluster for high speed parallel computing
  • Benefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable...
Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
SVG Colors, Patterns & Gradients: Painting Vector Graphics
SVG Colors, Patterns & Gradients: Painting Vector Graphics

As a vector graphics format, SVG uses precisely-defined geometric shapes to build an image. But that doesn't mean that SVG graphics have to look like technical drawings. SVG graphics can be shaded, textured, built from partially-transparent overlapping layers, or even filled with photographic images.

SVG Colors,...

CompTIA Linux+ Guide to Linux Certification (MindTap Course List)
CompTIA Linux+ Guide to Linux Certification (MindTap Course List)

Equip yourself with the most up-to-date information to pass CompTIA's Linux+ (Powered by LPI) Certification exam successfully and excel when using Linux in today's business world with Eckert's LINUX+ GUIDE TO LINUX CERTIFICATION, 4E. This complete guide provides the solid conceptual foundation and mastery of hands-on skills...

Java Persistence with Hibernate
Java Persistence with Hibernate

Summary

Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR...

Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset

Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.

As Big Data Made Easy: A Working...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Result Page: 338 337 336 335 334 333 332 331 330 329 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy