-
Turk tili: 1-kurs talabalari uchun darslik
Ushbu darslik O‘zbekiston Respublikasi Oliy va o‘rta maxsus ta’lim vazirligining “Ta’lim mazmunini rivojlantirish” mavzusi “Filologiya va tillarni o‘qitish” yo‘nalishi uchun 1-kurs talabalari uchun mo‘ljallangan bo‘lib, kitobda o‘zbek tilida ta’lim oluvchi turk tilida so‘zlovchi, ilg‘or, innovatsion va eksperimental yondashuvlar harakatga keltirilgan hozirgi zamon ko‘nikmalariga moslashgan yondashuvlar va tajribalarni o‘zlashtirish va yangi pedagogik metodlarni tatbiq etish borasidagi bilimlarni egallashda darslik o‘quvchilarga kerakli yordam beradi
-
Touchstone 2 workbook
"Touchstone 2 Workbook" предлагает упражнения для улучшения навыков общения на английском языке. Книга помогает изучающим развить словарный запас и грамматические структуры при помощи активностей, ориентированных на реальные жизненные ситуации
-
Security Automation with Python
The target audience for this book includes security professionals, DevOps engineers, and IT administrators with a foundational understanding of Python programming and cybersecurity principles. You should ideally have experience with basic scripting, familiarity with network security concepts, and an interest in automating security tasks. Those with knowledge of vulnerability management, incident response, and general IT systems will benefit most, as the book delves into using Python and tools such as Ansible for practical automation in these areas. While prior exposure to automation frameworks is helpful, the book provides step-by-step guidance to bridge any knowledge gaps.
-
Salesforce Anti-Patterns
This book is for anyone who has a position of responsibility in a Salesforce implementation and wants to see it avoid the common mistakes that plague many projects. While the primary audience is architects or aspiring architects, it will also be of value for project managers, business analysts, functional consultants, and executives overseeing Salesforce projects. In this book, you will get information structured into the seven domains of the Certified Technical Architect (CTA) exam roadmap. That way, while all the information is based on real-world examples, you will also be able to directly apply it in your journey to becoming a CTA, should that be a path you are on or are considering.
-
Elementary chinese readers. book one
This book is designed for foreign students learning Chinese in Beijing. It emphasizes practical application, with lessons structured logically to enhance step-by-step learning. Initial lessons focus on phonetics and character pronunciation, gradually introducing more complex grammar and sentence patterns. The inclusion of dialogues, exercises, and drills ensures comprehensive learning and retention. For familiarization, both simplified and traditional characters are included, catering to students' diverse needs
-
Procedural Content Generation with Unreal Engine 5
Unreal artists who are already experienced with Unreal Engine will discover a fresh perspective on world-building with PCG tools through this book. It introduces a novel approach to constructing procedurally generated environments by leveraging the PCG framework and other elements, emphasizing the strategic use of specific nodes in a blueprint-node setup. Through this guide, artists can explore innovative techniques to improve their skills in Unreal Engine and create dynamic, procedurally generated worlds.
-
Pandas Cookbook. Third Edition
This book contains a huge number of recipes, ranging from very simple to advanced. All recipes strive to be written in clear, concise, and modern idiomatic pandas code. The How it works sections contain extremely detailed descriptions of the intricacies of each step of the recipe. Often, in the There’s more. section, you will get what may seem like an entirely new recipe. This book is densely packed with an extraordinary amount of pandas code. While not strictly required, users are advised to read the book chronologically. The recipes are structured in such a way that they first introduce concepts and features using very small, directed examples, but continuously build from there into more complex applications.
-
Minimal CMake. Learn the Best Bits of CMake to Create and Share Your Own Libraries and Applications
CMake is one of those tools that unfortunately (though, not necessarily undeservedly) has a bit of a bad reputation. There are many developers out there who've been burned by CMake. They may have been forced to interact with it in a legacy code base, having had to deal with significant complexity, reams of CMake scripts, and questionable practices. Alternatively, they may have tried to use it for a new project, only to get stuck and frustrated trying to get things to work. As CMake has been around for a long time, there are many outdated examples and resources referencing old versions of CMake without all the latest features (and the benefit of hindsight about what works, and what not to do). As with any successful framework or language, CMake also comes with a certain amount of baggage, which is unfortunately unavoidable.
-
Contemporary chinese 3
This teacher's book is designed for English-speaking learners to improve their Chinese language skills in a comprehensive manner. It includes vocabulary, notes, grammar, and cultural background, divided into lessons, each focusing on different characters and dialogue, enhanced by visual aids for effective learning
-
Contemporary chinese
Этот ресурс предназначен для обучения английских студентов китайскому языку. Включает фонетический, вводный и непрерывный курсы, грамматику и культурологические компоненты. Особое внимание уделяется развитию навыков аудирования, чтения и письма, а также способности к коммуникации в социальных ситуациях
-
Microsoft Defender for Identity in Depth
A well-known phrase in cyber security is “hackers don't break in, they log in.” Anyone who has worked in incident response, in a security operations center, or in any kind of threat-hunting role can attest to the truth of this statement. Despite being with us for many years, and despite the evolution of cloud identity platforms such as Microsoft Entra ID, in many organizations, Microsoft Active Directory is still at the heart of the corporate identity landscape. Identities, from our regular users to our most privileged administrators, are key to maintaining the security of our environments or limiting the impact of compromise.
-
Hands-On Machine Learning with C++ (2nd Ed. )
If you want to get started with ML algorithms and techniques using the popular C++ language, then this book is for you. Aside from being a useful first course in ML with C++, this book will also appeal to data analysts, data scientists, and ML developers looking to implement different ML models in production using C++, which can be useful for some specific platforms, for example, embedded devices. Working knowledge of the C++ programming language, linear algebra, and basic calculus understanding are needed to get started with this book.
-
Ghidra Software Reverse-Engineering for Beginners
In this introductory chapter, we will provide an overview of Ghidra in some respects. Before starting, it would be convenient to know how to acquire and install the program. This is obviously something simple and trivial if you want to install a release version of the program. However, you probably want to know this program in depth. In that case, I can tell you in advance that it is possible to compile the program by yourself from the source code. Since the source code of Ghidra is available and ready to be modified and extended, you will probably also be interested in knowing how it is structured, what kinds of pieces of code exist, and so on. This is a great opportunity to discover the enormous possibilities that Ghidra offers us. It is also interesting to review the main functionalities of Ghidra from the point of view of a reverse engineer. This will spark your interest in this tool since it has its own peculiarities, and this is precisely the most interesting thing about Ghidra.
-
Game Development Patterns with Godot 4
This book is for anyone with sufficient knowledge to understand what variables and methods are. As we introduce basic programming and object-oriented programming concepts, most of the content in the book can be used by intermediate to advanced programmers. People who have experience with GDScript and the Godot Engine editor will take the most out of this book as the main focus is to present the design patterns themselves. People with no programming background will have trouble understanding the core concepts and how each pattern helps to solve specific issues.
-
OpenJS Node.js Application Developer
Get certified in Node.js application development and take your career to the next level! The JSNAD certification is your ticket to proving your deep understanding and proficiency in Node.js application development. This fantastic book is perfect for anyone aiming to ace the JSNAD exam. The book is packed with essential Node.js concepts, including asynchronous programming, middleware integration, and advanced routing techniques. This is your chance to get to grips with the core aspects of Node.js and build a solid foundation! And there's more! You'll also learn about testing strategies, deployment methodologies, and performance optimization.
-
Принципы корпоративных финансов
Учебник представляет собой комплексное руководство по финансовым концепциям, охватывающее ключевые темы, такие как денежный поток, приведенная стоимость, стоимость привлечения капитала и оценка риска. В книге подробно рассматриваются принципы и механизмы функционирования финансовых рынков как внутри страны, так и на международной арене. Особое внимание уделено различным инвестиционным инструментам, включая производные инструменты, такие как опционы и конвертируемые бумаги. Этот учебник будет полезен студентам и преподавателям финансовых дисциплин, финансовым менеджерам всех уровней, а также специалистам, работающим в сфере государственных финансовых учреждений.