Telegram Group & Telegram Channel
Mining the Social Web, 3rd Edition (Jupyter Examples)

The official code repository for Mining the Social Web, 3rd Edition. The book is available from Amazon and Safari Books Online.

The notebooks folder of this repository contains the latest bug-fixed sample code used in the book chapters.

▫️ Chapter 0 - Preface.ipynb
▫️ Chapter 1 - Mining Twitter.ipynb
▫️ Chapter 2 - Mining Facebook.ipynb
▫️ Chapter 3 - Mining Instagram.ipynb
▫️ Chapter 4 - Mining LinkedIn.ipynb
▫️ Chapter 5 - Mining Text Files.ipynb
▫️ Chapter 6 - Mining Web Pages.ipynb
▫️ Chapter 7 - Mining Mailboxes.ipynb
▫️ Chapter 8 - Mining GitHub.ipynb
▫️ Chapter 9 - Twitter Cookbook.ipynb
▫️ _Appendix A - Virtual Machine Experience.ipynb
▫️ _Appendix B - OAuth Primer.ipynb
▫️ _Appendix C - Python & Jupyter Notebook Tips.ipynb

👉 @python_powerbi

https://github.com/mikhailklassen/Mining-the-Social-Web-3rd-Edition



tg-me.com/python_powerbi/712
Create:
Last Update:

Mining the Social Web, 3rd Edition (Jupyter Examples)

The official code repository for Mining the Social Web, 3rd Edition. The book is available from Amazon and Safari Books Online.

The notebooks folder of this repository contains the latest bug-fixed sample code used in the book chapters.

▫️ Chapter 0 - Preface.ipynb
▫️ Chapter 1 - Mining Twitter.ipynb
▫️ Chapter 2 - Mining Facebook.ipynb
▫️ Chapter 3 - Mining Instagram.ipynb
▫️ Chapter 4 - Mining LinkedIn.ipynb
▫️ Chapter 5 - Mining Text Files.ipynb
▫️ Chapter 6 - Mining Web Pages.ipynb
▫️ Chapter 7 - Mining Mailboxes.ipynb
▫️ Chapter 8 - Mining GitHub.ipynb
▫️ Chapter 9 - Twitter Cookbook.ipynb
▫️ _Appendix A - Virtual Machine Experience.ipynb
▫️ _Appendix B - OAuth Primer.ipynb
▫️ _Appendix C - Python & Jupyter Notebook Tips.ipynb

👉 @python_powerbi

https://github.com/mikhailklassen/Mining-the-Social-Web-3rd-Edition

BY Python 🐍 Work With Data




Share with your friend now:
tg-me.com/python_powerbi/712

View MORE
Open in Telegram


Python Work With Data Telegram | DID YOU KNOW?

Date: |

Newly uncovered hack campaign in Telegram

The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.

Telegram has exploded as a hub for cybercriminals looking to buy, sell and share stolen data and hacking tools, new research shows, as the messaging app emerges as an alternative to the dark web.An investigation by cyber intelligence group Cyberint, together with the Financial Times, found a ballooning network of hackers sharing data leaks on the popular messaging platform, sometimes in channels with tens of thousands of subscribers, lured by its ease of use and light-touch moderation.Python Work With Data from in


Telegram Python 🐍 Work With Data
FROM USA