Monster Trucks (2016) | Pose – Saison 1 vostfr | supergirl s03e22
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
HTML5 and CSS3: Level Up with Today's Web Technologies
HTML5 and CSS3: Level Up with Today's Web Technologies

HTML5 and CSS3 are more than just buzzwords--they're the foundation for today's web applications. This book gets you up to speed on the HTML5 elements and CSS3 features you can use right now in your current projects, with backwards compatible solutions that ensure that you don't leave users of older browsers behind. This new...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Swift iOS 24-Hour Trainer
Swift iOS 24-Hour Trainer

Jump into the app development world with confidence!

iOS Swift 24-Hour Trainer combines book and video lessons in Apple's Swift programming language to prepare you to build iPhone and iPad apps—and distribute them through the Appstore. First, this approachable text covers the fundamentals of Swift by...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Event-Driven Programming
Event-Driven Programming
The previous unit, Unit 6, has shown you how to create graphical user interfaces that contain a wide range of components and have quite sophisticated layouts. You are also in a position now to make use of Java reference material to investigate and use other components and layouts. However, when the user clicks on a button or enters text, nothing...
Programming Logic and Design, Comprehensive
Programming Logic and Design, Comprehensive

Prepare beginning programmers with the most important principles for developing structured program logic with Farrell's highly effective PROGRAMMING LOGIC AND DESIGN, COMPREHENSIVE, 7E. This popular text takes a unique, language-independent approach to programming with a distinctive emphasis on modern conventions. The book's clear,...

An Introduction to the Modeling of Neural Networks (Collection Alea-Saclay: Monographs and Texts in Statistical Physics)
An Introduction to the Modeling of Neural Networks (Collection Alea-Saclay: Monographs and Texts in Statistical Physics)

This text is a graduate-level introduction to neural networks, focusing on current theoretical models, examining what these models can reveal about how the brain functions, and discussing the ramifications for psychology, artificial intelligence, and the construction of a new generation of intelligent computers. The book is divided into four...

A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R
A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R

The only how-to guide offering a unified, systemic approach to acquiring, cleaning, and managing data in R

Every experienced practitioner knows that preparing data for modeling is a painstaking, time-consuming process. Adding to the difficulty is that most modelers learn the steps involved in cleaning and managing data...

Parallel and Distributed Map Merging and Localization: Algorithms, Tools and Strategies for Robotic Networks (SpringerBriefs in Computer Science)
Parallel and Distributed Map Merging and Localization: Algorithms, Tools and Strategies for Robotic Networks (SpringerBriefs in Computer Science)

This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinated tasks. After identifying the main issues associated with this problem, each chapter introduces a different distributed strategy for solving...

Social Network-Based Recommender Systems
Social Network-Based Recommender Systems

This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters...

Microsoft Word 2010: Illustrated Complete (Illustrated Series: Individual Office Applications)
Microsoft Word 2010: Illustrated Complete (Illustrated Series: Individual Office Applications)

Loved by instructors for its visual and flexible way to build computer skills, the Illustrated Series is ideal for teaching Microsoft Office Word 2010 to both computer rookies and hotshots. Each two-page spread focuses on a single skill, making information easy to follow and absorb. Large, full-color illustrations represent how the...

Result Page: 438 437 436 435 434 433 432 431 430 429 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy