IP Subnetting

IP Subnetting

We’re also going to talk about the IP Protocol, why it matters in today’s world and how it managed to...

High Content Screening

High Content Screening

This second edition details some of the recent trends in HCS/HCA/HCI.  New and updated chapters guide readers through methods that...

Foundations of Programming Languages

Foundations of Programming Languages

This clearly written textbook introduces the reader to the three styles of programming, examining object-oriented/imperative, functional, and logic programming. The...

Pro Power BI Desktop

Pro Power BI Desktop

Deliver eye-catching Business Intelligence with Microsoft Power BI Desktop. This new edition has been updated to cover all the latest...

Reinforcement Learning

Reinforcement Learning

Master reinforcement learning, a popular area of machine learning, starting with the basics: discover how agents and the environment evolve...

Privileged Attack Vectors

Privileged Attack Vectors

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks...

PySpark Recipes

PySpark Recipes

Quickly find solutions to common programming problems encountered while processing big data. Content is presented in the popular problem-solution format. Look...

BA Transformations

BA Transformations

Adapt your career as a database administrator to the changing industry. Learn where the growth and demand for DBA talent...

Python 2 and 3 Compatibility

Python 2 and 3 Compatibility

Discover clean ways to write code that will run on both Python 2 and 3.This book is tutorial-oriented with detailed examples of...