Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Python for beginners
Description
Introduction
Chapter 1: Why python
Chapter 2: Python for Data Analysis – Basics
Python REPL
Python Basic - Data Types and Operators
Basic Containers – Lists and Tuples
Modules
Conditional Statements
Loops
Extra – Zen of Python
Exercises
Chapter 3: Python Operators
Arithmetic Operators
Assignment Operators
Membership Operators
Identity Operators
Chapter 4: Supervised Learning Algorithms
Regression
K-Nearest Neighbors
Chapter 5: Creating & Accessing Your Python Dictionary
Creating and Combining Strings
Accessing and Updating Strings
Chapter 6: Introducing Variables
Integers, Strings and Floats Oh My!
Performing Operations on Variables
Chapter 7: Naming Conventions and Comments
Using Comments
Chapter 8: Handling Inputs
Chapter 9: Working with the Conditional Statements
Chapter 10: Exception Handling in the Python Language
Chapter 11: Functions, Classes and Methods
Introduction to OOP
How to Define a Class
How to Define a Method
Chapter 12: Using Linear Regression for Predictions
Simple Linear Regression
Multiple Regression
Chapter 13: Replacing and Correcting words
Chapter 14: Using Jupyter notebook for user interaction
Display tabular data in IPython notebook
Adding user interaction
Chapter 15: The Regular Expressions
Chapter 16: Data Visualization with Python
Conclusion
C++ for beginners
Description
Introduction
Chapter 1 : C++ Functions
Function Declaration
Call by Value
Call by Pointer
Call by Reference
Default Values for Parameters
Chapter 2 : Operators
Arithmetic operators
Arithmetic operators
The following program is used to showcase the way we can use arithmetic operators.
Relational operators
Relational operators
The following program is used to showcase the way we can use relational operators.
Logical operators
Relational operators
Relational operators - AND
The following program is used to showcase the way we can use logical operators for the AND operator.
Relational operators - OR
The following program is used to showcase the way we can use logical operators for the OR operator.
Relational operators - NOT
The following program is used to showcase the way we can use logical operators for the NOT operator.
Assignment operators
Assignment operators
The following program is used to showcase the way we can use assignment operators.
Bitwise operators
Bitwise operators
The following program is used to showcase the way we can use bitwise operators.
Chapter 3 : Storage classes
The auto Storage Class
The register Storage Class
The Static Storage Class
The extern Storage Class
Chapter 4 : Identifiers
Chapter 5 : Decision Control in C++
Switch statements
The ‘if’ statements
The ‘if’ else statements
The ‘elif’ statements
Chapter 6 : Using Switch Statements
Chapter 7 : Writing and Reading Files
Chapter 8 : More on Functions & Data Types
Chapter 9 : Constants and Literals
The following program is used to showcase the way we can define constants.
The following program is used to showcase an error condition when using constants.
Integer literals
The following program is used to showcase the use of integer literals.
The following program is used to showcase how to use hexadecimal and octal literals.
Floating point literals
The following program is used to showcase the use of floating-point literals.
Character literals
Escape sequences
The following program is used to showcase character literals.
String literals
The following program is used to showcase string literals.
Chapter 10 : Signed and Unsigned Data types
Data types ranges for short, long, signed and unsigned
The following program is used to showcase the way we can define unsigned and signed values in C++.
The following program is used to showcase the way we can use short and long integers in a C++ program.
Chapter 11 : Introduction to Classes
Chapter 12 : Deeper Class Concepts
Chapter 13 : Object Oriented Programming
Objects and Classes
Member Functions inside a Class
Array of Objects
Projects
Chapter 14 : Improved Techniques
Variable argument lists
Chapter 15 : Multithreaded Applications in C++
Chapter 16 : War with bugs
Chapter 17 : The New Versions: C++ 14
Return Type Deduction
Relaxed Restrictions constexpr
Number Separators
Keyword: auto
Example Programs
Generic Lambdas
New Standard Library Features
User Defined Literals
Binary Literals
Variable Template
Chapter 18 : Game Design
Introduction to Game Design
User-Friendliness
Heads or Tails
Rock Paper Scissors
Guess the Number
Dragon Clash
Midpoint Test (Answer Key)
Chapter 19 Project: Agenda
Conclusion
Linux for beginners
Description
Introduction
Chapter 1: Getting started with Linux
Chapter 2: Choosing a Linux Distribution System
Chapter 3: Connecting to the Internet with Linux
Chapter 4: Essential Linux Commands
Chapter 5: Linux’s Available Features
Chapter 6: Disk Storage Management
Chapter 7: Redirecting Commands in Linux
Using Redirection
Chapter 8: User and Group Management
Users and Groups
Who is a user?
What is a group?
Getting Superuser Access
The root user
Using Su to Switch Users
sudo and the root
Chapter 9: Commands and Functions for the Beginner
Chapter 10: Using Linux Text Editors
How to Use GUI Text Editors
Using ed and vi as Text Editors
Chapter 11: Coding with Linux
More Linux commands
Chapter 12: Programming in Linux using Python
Chapter 13: Advanced Shell Programming
Chapter 14: Blockchain, Linux, and Net Neutrality
Become a Blockchain Node
Become a Blockchain Miner
Linux and the Internet of Things (500 words)
Chapter 15: Build and Edit Applications
Use an Integrated Development Environment
Write Patches
Conclusion
HACKING WITH KALI LINUX
Description
Introduction
Chapter 1 Hacking Basics
Chapter 2 Getting Started
Chapter 3 Obtaining Passwords
Installing fluxion
Using fluxion
Chapter 4 The Hacking Guide
Properties of kali linux 2.0
Chapter 5 Mobile Hacking
Super bluetooth hack
Blue scanner
Bluesnarfer
Blue sniff
Hacking into Mobile Apps
Modification/Injection of the code
Reverse Engineering
Chapter 6 Penetration Testing Basics
Chapter 7 Spoofing Techniques
Ip spoofing
Arp spoofing
Website spoofing
Email spoofing
Chapter 8 Some Of The Basic Functions Of Linux
Working on the File System
Chapter 9 Taking Command And Control
Using the Pastebin channel
Chapter 10 The Laboratory
Chapter 11 Understanding Why You Need To Hack Your Own Systems
Chapter 12 Linux Commands
Chapter 13 Learning the essential hacking command line
Chapter 14 What Are Cryptography And Digital Signature
Chapter 15 Follow-Up
Hacking the Follow-Up Process
Advertising Rule of 7
Map It to Your Sales Cycle
The Process
Even When You Don’t Get Their Contact Info
Growth Hacking Applied
Conclusion
← Prev
Back
Next →
← Prev
Back
Next →