Python for Data Mining Quick Syntax ReferenceLearn how to use Python and its structures, how to install Python, and which tools are best suited for data analyst work. This book provides you with a handy reference and tutorial on topics ranging from basic Python concepts through to data mining, manipulating and importing datasets, and data analysis.
Python for Data Mining Quick Syntax Reference covers each concept concisely, with many illustrative examples. You'll be introduced to several data mining packages, with examples of how to use each of them.
The first part covers core Python including objects, lists, functions, modules, and error handling. The second part covers Python's most important data mining packages: NumPy and SciPy for mathematical functions and random data generation, pandas for dataframe management and data import, Matplotlib for drawing charts, and scikitlearn for machine learning.
Install Python and choose a development environment; Understand the basic concepts of object-oriented programming; Imp ...
Modern X86 Assembly Language Programming, 2nd EditionGain the fundamentals of x86 64-bit assembly language programming and focus on the updated aspects of the x86 instruction set that are most relevant to application software development. This book covers topics including x86 64-bit programming and Advanced Vector Extensions (AVX) programming.
The focus in this second edition is exclusively on 64-bit base programming architecture and AVX programming. Modern X86 Assembly Language Programming's structure and sample code are designed to help you quickly understand x86 assembly language programming and the computational capabilities of the x86 platform. After reading and using this book, you'll be able to code performance-enhancing functions and algorithms using x86 64-bit assembly language and the AVX, AVX2 and AVX-512 instruction set extensions.
Discover details of the x86 64-bit platform including its core architecture, data types, registers, memory addressing modes, and the basic instruction set; Use the x86 64-bit instruction set ...
Decoupled Drupal in PracticeGain a clear understanding of the most important concepts in the decoupled CMS landscape. You will learn how to architect and implement decoupled Drupal architectures across the stack - from building the back end and designing APIs to integrating with front-end technologies. You'll also review presenting data through consumer applications in widely adopted technologies such as Angular, Ember, React, and Vue.js.
Featuring a foreword by Drupal founder and project lead Dries Buytaert, the first part of this book chronicles the history of the CMS and the server - client divide, analyzes the risks and rewards of decoupled CMS architectures, and presents architectural patterns. From there, the book explores the core and contributed landscape for decoupled Drupal, authentication mechanisms, and the surrounding tooling ecosystem before delving into consumer implementations in a variety of technologies. Finally, a series of chapters on advanced topics feature the Drupal REST plugin system, s ...
The LEGO BOOST Activity BookThe LEGO BOOST kit lets younger builders create fun, multifunctional robots by combining bricks with code, but it doesn't come with a manual. With the help of this complete guide to the LEGO BOOST set, you'll be on your way to building and programming BOOST robots in no time.
You'll begin your exploration by building a basic rover robot called MARIO to help you learn the fundamentals of the BOOST programming environment. Next, you'll add features to your rover to control its movement and make it repeat actions and react to colors and sounds. Once you've learned some programming basics, you'll learn how to program your robot to do things like follow lines on the ground, scan its environment to decide where to go, and even play darts. As final projects, you'll create two complete robots: BrickPecker to help you organize your bricks and CYBOT, a robot that talks, shoots objects, and executes voice commands.
As you advance through the book, optional lessons aim to deepen your underst ...
Eloquent JavaScript, 3rd EditionJavaScript lies at the heart of almost every modern web application, from social apps like Twitter to browser-based game frameworks like Phaser and Babylon. Though simple for beginners to pick up and play with, JavaScript is a flexible, complex language that you can use to build full-scale applications.
This much anticipated and thoroughly revised third edition of Eloquent JavaScript dives deep into the JavaScript language to show you how to write beautiful, effective code. It has been updated to reflect the current state of JavaScript and web browsers and includes brand-new material on features like class notation, arrow functions, iterators, async functions, template strings, and block scope. A host of new exercises have also been added to test your skills and keep you on track.
As with previous editions, Haverbeke continues to teach through extensive examples and immerses you in code from the start, while exercises and full-chapter projects give you hands-on experience with wr ...
Understanding PhotographyLearn the core concepts and techniques you need to know to take better photos, from choosing the best lens for your stylistic goals to selecting the right camera settings for different lighting conditions.
With clear explanations and highly visual examples, Sean T. McHugh takes you from basic concepts like exposure and depth of field to more advanced topics, such as how camera lenses and sensors capture light to produce images. You'll learn not only which camera settings to use in different situations but also the reasons why.
Choose lenses that give greater control over perspective; Minimize image noise by understanding how digital sensors work; Get the exposure you want even in fog, mist, or haze; Improve hand-held shots by mastering shutter speed and autofocus; Use tripods, lens filters, and flash to enhance image capture.
Whether you want to understand digital photography at a deeper level or simply want to take better photos, Understanding Photography will help you get th ...
Practical Binary AnalysisAs malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out - binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs to understand what they really do, rather than what we think they should do. While reverse engineering and disassembly are critical first steps in many forms of binary analysis, there is much more to be learned.
This hands-on guide teaches you how to tackle the fascinating but challenging topics of binary analysis and instrumentation and helps you become proficient in an area typically only mastered by a small group of expert hackers. It will take you from basic concepts to state-of-the-art methods as you dig into topics like code injection, disassembly, dynamic taint analysis, and binary instrumentation. Written for security engineers, hackers, and ...
Linux Basics for HackersIf you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.
First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: Cover your tracks by changing your network information and manipulating the rsyslog logging utility; Write a tool to scan for network co ...
Beginning iOS AR Game DevelopmentCreate a fully featured application that's both sophisticated and engaging. This book provides a detailed guide in developing augmented reality games that can take advantage of the advanced capabilities of new iOS devices and code while also offering compatibility with still supported legacy devices.
No programming experience is necessary as this book begins on the ground floor with basic programming concepts in Unity and builds to incorporating input from the real world to create interactive realities. You'll learn to program with the Unity 2017 development platform using C#.
Recent announcements of increased AR capabilities on the latest iPhones and iPads show a clear dedication on Apple's part to this emerging market of immersive games and apps. Unity 2017 is the latest version of this industry leading development platform and C# is a ubiquitous programming language perfect for any programmer to begin with.
Using the latest development technologies, Beginning iOS AR Game ...
Quick Start Guide to Penetration TestingGet started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities.
The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime.
The final part of the book concludes ...