Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Python for beginners Description Introduction Chapter 1: Why python Chapter 2: Python for Data Analysis – Basics
Python REPL Python Basic - Data Types and Operators Basic Containers – Lists and Tuples Modules Conditional Statements Loops Extra – Zen of Python Exercises
Chapter 3: Python Operators
Arithmetic Operators Assignment Operators Membership Operators Identity Operators
Chapter 4: Supervised Learning Algorithms
Regression K-Nearest Neighbors
Chapter 5: Creating & Accessing Your Python Dictionary
Creating and Combining Strings Accessing and Updating Strings
Chapter 6: Introducing Variables
Integers, Strings and Floats Oh My! Performing Operations on Variables
Chapter 7: Naming Conventions and Comments
Using Comments
Chapter 8: Handling Inputs Chapter 9: Working with the Conditional Statements Chapter 10: Exception Handling in the Python Language Chapter 11: Functions, Classes and Methods
Introduction to OOP
How to Define a Class How to Define a Method
Chapter 12: Using Linear Regression for Predictions
Simple Linear Regression
Multiple Regression
Chapter 13: Replacing and Correcting words Chapter 14: Using Jupyter notebook for user interaction
Display tabular data in IPython notebook Adding user interaction
Chapter 15: The Regular Expressions Chapter 16: Data Visualization with Python Conclusion C++ for beginners Description Introduction Chapter 1 : C++ Functions
Function Declaration Call by Value Call by Pointer Call by Reference Default Values for Parameters
Chapter 2 : Operators
Arithmetic operators
Arithmetic operators The following program is used to showcase the way we can use arithmetic operators.
Relational operators
Relational operators The following program is used to showcase the way we can use relational operators.
Logical operators
Relational operators Relational operators - AND The following program is used to showcase the way we can use logical operators for the AND operator. Relational operators - OR The following program is used to showcase the way we can use logical operators for the OR operator. Relational operators - NOT The following program is used to showcase the way we can use logical operators for the NOT operator.
Assignment operators
Assignment operators The following program is used to showcase the way we can use assignment operators.
Bitwise operators
Bitwise operators The following program is used to showcase the way we can use bitwise operators.
Chapter 3 : Storage classes
The auto Storage Class The register Storage Class The Static Storage Class The extern Storage Class
Chapter 4 : Identifiers Chapter 5 : Decision Control in C++
Switch statements The ‘if’ statements The ‘if’ else statements The ‘elif’ statements
Chapter 6 : Using Switch Statements Chapter 7 : Writing and Reading Files Chapter 8 : More on Functions & Data Types Chapter 9 : Constants and Literals
The following program is used to showcase the way we can define constants. The following program is used to showcase an error condition when using constants. Integer literals
The following program is used to showcase the use of integer literals. The following program is used to showcase how to use hexadecimal and octal literals.
Floating point literals
The following program is used to showcase the use of floating-point literals.
Character literals
Escape sequences The following program is used to showcase character literals.
String literals
The following program is used to showcase string literals.
Chapter 10 : Signed and Unsigned Data types
Data types ranges for short, long, signed and unsigned The following program is used to showcase the way we can define unsigned and signed values in C++. The following program is used to showcase the way we can use short and long integers in a C++ program.
Chapter 11 : Introduction to Classes Chapter 12 : Deeper Class Concepts Chapter 13 : Object Oriented Programming
Objects and Classes Member Functions inside a Class Array of Objects Projects
Chapter 14 : Improved Techniques
Variable argument lists
Chapter 15 : Multithreaded Applications in C++ Chapter 16 : War with bugs Chapter 17 : The New Versions: C++ 14
Return Type Deduction Relaxed Restrictions constexpr Number Separators Keyword: auto
Example Programs
Generic Lambdas New Standard Library Features User Defined Literals Binary Literals Variable Template
Chapter 18 : Game Design
Introduction to Game Design User-Friendliness Heads or Tails Rock Paper Scissors Guess the Number Dragon Clash Midpoint Test (Answer Key)
Chapter 19 Project: Agenda Conclusion Linux for beginners Description Introduction Chapter 1: Getting started with Linux Chapter 2: Choosing a Linux Distribution System Chapter 3: Connecting to the Internet with Linux Chapter 4: Essential Linux Commands Chapter 5: Linux’s Available Features Chapter 6: Disk Storage Management Chapter 7: Redirecting Commands in Linux
Using Redirection
Chapter 8: User and Group Management
Users and Groups
Who is a user? What is a group?
Getting Superuser Access
The root user
Using Su to Switch Users
sudo and the root
Chapter 9: Commands and Functions for the Beginner Chapter 10: Using Linux Text Editors
How to Use GUI Text Editors Using ed and vi as Text Editors
Chapter 11: Coding with Linux
More Linux commands
Chapter 12: Programming in Linux using Python Chapter 13: Advanced Shell Programming Chapter 14: Blockchain, Linux, and Net Neutrality
Become a Blockchain Node Become a Blockchain Miner Linux and the Internet of Things (500 words)
Chapter 15: Build and Edit Applications
Use an Integrated Development Environment Write Patches
Conclusion HACKING WITH KALI LINUX Description Introduction Chapter 1 Hacking Basics Chapter 2 Getting Started Chapter 3 Obtaining Passwords
Installing fluxion Using fluxion
Chapter 4 The Hacking Guide
Properties of kali linux 2.0
Chapter 5 Mobile Hacking
Super bluetooth hack Blue scanner Bluesnarfer Blue sniff Hacking into Mobile Apps
Modification/Injection of the code Reverse Engineering
Chapter 6 Penetration Testing Basics Chapter 7 Spoofing Techniques
Ip spoofing Arp spoofing Website spoofing Email spoofing
Chapter 8 Some Of The Basic Functions Of Linux
Working on the File System
Chapter 9 Taking Command And Control
Using the Pastebin channel
Chapter 10 The Laboratory Chapter 11 Understanding Why You Need To Hack Your Own Systems Chapter 12 Linux Commands Chapter 13 Learning the essential hacking command line Chapter 14 What Are Cryptography And Digital Signature Chapter 15 Follow-Up
Hacking the Follow-Up Process Advertising Rule of 7 Map It to Your Sales Cycle
The Process Even When You Don’t Get Their Contact Info Growth Hacking Applied
Conclusion
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion