Hello guest, if you read this it means you are not registered. Click here to register in a few simple steps, you will enjoy all features of our Forum.
Rules have been updated! Here

Tags
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2431
[packt] ROS Robotics Projects: Build and control robots powered 2nd
[Image: https://i.postimg.cc/KjpGH3zv/image.png]

Key Features
  • Create and program cool robotic projects using powerful ROS libraries
  • Build industrial robots like mobile manipulators to handle complex tasks
  • Learn how reinforcement learning and deep learning are used with ROS
Book Description
Nowadays, heavy industrial robots placed in workcells are being replaced by new age robots called cobots, which don't n
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2681
[packt] The Applied TensorFlow and Keras Workshop: Build your practical skills 2nd
[Image: https://i.imgur.com/p8bYITI.png]

Key Features
  • Understand the nuances of setting up a deep learning programming environment
  • Gain insights into the common components of a neural network and its essential operations
  • Get to grips with deploying a machine learning model as an interactive web application with Flask
Book Description
Machine learning gives computers the ability to learn like humans. It is becoming increasingly transformational to b
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2597
[packt] The Applied SQL Data Analytics Workshop: Develop your practical skills 2nd
[Image: https://i.imgur.com/AFOujBJ.png]

Key Features
  • Explore ways to use SQL for data analytics and gain key insights from your data
  • Study advanced analytics, such as geospatial and text analytics
  • Discover ways to integrate your SQL pipelines with other analytics technologies
Book Description
Every day, businesses operate around the clock and a huge amount of data is generated at a rapid pace. Hidden in this data are key patterns and behaviors t
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2580
Write Great Code, Volume 2: Thinking Low-Level, Writing High-Level, 2nd Edition
[Image: https://i.imgur.com/8Rukxb9.png]
Today's programming languages offer productivity and portability, but also make it easy to write sloppy code that isn't optimized for a compiler. Thinking Low-Level, Writing High-Level will teach you to craft source code that results in good machine code once it's run through a compiler.

You'll learn:
    How to analyze the output of a compiler to verify that your code generates good machine code
    The types of machine cod
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2415
Discovering Computer Science: Interdisciplinary Problems, Principles, and Python 2nd
[Image: https://i.imgur.com/CYqAuO9.png]
"Havill's problem-driven approach introduces algorithmic concepts in context and motivates students with a wide range of interests and backgrounds."

-- Janet Davis, Associate Professor and Microsoft Chair of Computer Science, Whitman College

"This book looks really great and takes exactly the approach I think should be used for a CS 1 course. I think it really fills a need in the textbook landscape."

[i]-- [b]Marie desJar
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 1796
[packt] Metasploit 5.0 for Beginners 2nd
[Image: https://i.imgur.com/m5xDBIj.png]

Key Features
  • Perform pentesting in highly secured environments with Metasploit 5.0
  • Become well-versed with the latest features and improvements in the Metasploit Framework 5.0
  • Analyze, find, exploit, and gain access to different systems by bypassing various defenses
Book Description
Securing an IT environment can be challenging, however, effective pe
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2468
Black Hat Python: Python Programming for Hackers and Pentesters, 2nd
[Image: https://i.imgur.com/nXh0h1a.png]

Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, 2nd Edition, you’ll explore the darker side of Python’s capabilities—writing networ
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2374
Understanding Network Hacks: Attack and Defense with Python 3, 2nd
[Image: https://i.imgur.com/R4gfgKK.png]

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems an