IT eBooks
Download, Read, Use
A Graduate Course in Applied Cryptography
A Graduate Course in Applied Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications. While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem. Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through. ...
Coffee Break Python Slicing
Coffee Break Python Slicing

Puzzle-based learning is an active learning technique. With code puzzles, you will learn faster, smarter, and better. Coffee Break Python Slicing is all about growing your Python expertise - one coffee at a time. The focus lies on the important slicing technique to access consecutive data ranges. Understanding slicing thoroughly is crucial for your success as a Python developer. This book teaches you everything you need to know about slicing in Python. As a bonus, you will track your individual Python coding skill level throughout the book. ...
Programming Algorithms in Lisp
Programming Algorithms in Lisp

Master algorithms programming using Lisp, including the most important data structures and algorithms. This book also covers the essential tools that help in the development of algorithmic code to give you all you need to enhance your code. Programming Algorithms in Lisp shows real-world engineering considerations and constraints that influence the programs that use these algorithms. It includes practical use cases of the applications of the algorithms to a variety of real-world problems. ...
The Coding Workbook
The Coding Workbook

This beginner-friendly introduction to web development enables anyone to build a website by writing out code by hand - no computer or internet required. It's a fun, hands-on approach to coding that teaches the basics of using the HTML and CSS programming languages (the language of web pages). You write the code in the pages of your workbook and then draw what it would look like in a web browser. Teachers: This has everything you need to teach an introductory web development class, and the pages are perforated! Students: Learn the basics of HTML and CSS to build your own custom website! Once you've finished the workbook you'll have the skills to easily build and launch a website. It's that easy! This exercise-filled workbook is packed with illustrations and progress quizzes, making it perfect for at-home learning or schools lacking sufficient computer or internet access. It has everything you need to teach a coding class or learn basic web programming yourself. You don't n ...
Adversarial Tradecraft in Cybersecurity
Adversarial Tradecraft in Cybersecurity

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse. This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place. Throughout this book, you will learn how to gain an advantage ove ...
Human-in-the-Loop Machine Learning
Human-in-the-Loop Machine Learning

Most machine learning systems that are deployed in the world today learn from human feedback. However, most machine learning courses focus almost exclusively on the algorithms, not the human-computer interaction part of the systems. This can leave a big knowledge gap for data scientists working in real-world machine learning, where data scientists spend more time on data management than on building algorithms. Human-in-the-Loop Machine Learning is a practical guide to optimizing the entire machine learning process, including techniques for annotation, active learning, transfer learning, and using machine learning to optimize every step of the process. Machine learning applications perform better with human feedback. Keeping the right people in the loop improves the accuracy of models, reduces errors in data, lowers costs, and helps you ship models faster. Human-in-the-Loop Machine Learning lays out methods for humans and machines to work together effectively. You'll find best pra ...
Rust in Action
Rust in Action

Rust in Action introduces the Rust programming language by exploring numerous systems programming concepts and techniques. You'll be learning Rust by delving into how computers work under the hood. You'll find yourself playing with persistent storage, memory, networking and even tinkering with CPU instructions. The book takes you through using Rust to extend other applications and teaches you tricks to write blindingly fast code. You'll also discover parallel and concurrent programming. Filled to the brim with real-life use cases and scenarios, you'll go beyond the Rust syntax and see what Rust has to offer in real-world use cases. Rust is the perfect language for systems programming. It delivers the low-level power of C along with rock-solid safety features that let you code fearlessly. Ideal for applications requiring concurrency, Rust programs are compact, readable, and blazingly fast. Best of all, Rust's famously smart compiler helps you avoid even subtle coding errors. Rust ...
Open Data Structures (in Java)
Open Data Structures (in Java)

There are plenty of books that teach introductory data structures. Some of them are very good. Most of them cost money, and the vast majority of computer science undergraduate students will shell out at least some cash on a data structures book. Open Data Structures (in Java) - The goal of this book is to free undergraduate computer science students from having to pay for an introductory data structures book. ...
Open Data Structures (in C++)
Open Data Structures (in C++)

There are plenty of books that teach introductory data structures. Some of them are very good. Most of them cost money, and the vast majority of computer science undergraduate students will shell out at least some cash on a data structures book. Open Data Structures (in C++) - The goal of this project is to free undergraduate computer science students from having to pay for an introductory data structures book. ...
Computer Vision and Augmented Reality in iOS
Computer Vision and Augmented Reality in iOS

Learn how computer vision works, how augmented reality renders digital graphics into the physical world via an iPhone's camera, and how to incorporate these technologies into your own apps. This book shows you how to take full advantage of computer vision technologies. Interacting with other people online usually involves user-generated images and videos; whether it be "memes", short videos, or heavily-modified images. Before smart phones, generating this content required a professional using high-level image and video editing software. Not any more. This book will teach you to use computer vision in the most popular ways, such as for facial recognition, image to text analysis and, of course, recording a video of a dancing hot dog in your living room. Starting with the history of computer vision, image and video processing fundamentals, and an introduction to developing augmented reality applications, you'll learn to incorporate computer vision both in the content you create and t ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025