Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python 3 Text Processing with NLTK 3 Cookbook
Python 3 Text Processing with NLTK 3 Cookbook

Over 80 practical recipes on natural language processing techniques using Python's NLTK 3.0

About This Book

  • Break text down into its component parts for spelling correction, feature extraction, and phrase transformation
  • Learn how to do custom sentiment analysis and named entity...
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python

*** Book also provides you FREE Access to Online Instructional Videos. See video codes in the book ***

This book is about the 23 common GoF (Gang of Four) Design Patterns implemented and in Python.

A Design Pattern is a description or template that can be repeatedly applied to a commonly recurring...

Data Wrangling with Python: Tips and Tools to Make Your Life Easier
Data Wrangling with Python: Tips and Tools to Make Your Life Easier

How do you take your data analysis skills beyond Excel to the next level? By learning just enough Python to get stuff done. This hands-on guide shows non-programmers like you how to process information that’s initially too messy or difficult to access. You don't need to know a thing about the Python programming language to...

Active Directory Cookbook
Active Directory Cookbook

This book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory -- including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many...

Automating Microsoft Azure Infrastructure Services: From the Data Center to the Cloud with PowerShell
Automating Microsoft Azure Infrastructure Services: From the Data Center to the Cloud with PowerShell

Get valuable tips and techniques for automating your cloud deployments with Azure PowerShell cmdlets, and learn how to provision Azure services on the fly. In this hands-on guide, Microsoft cloud technology expert Michael Washam shows you how to automate various management tasks and deploy solutions that are both complex and at...

Time Series Databases: New Ways to Store and Access Data
Time Series Databases: New Ways to Store and Access Data

Time series data is of growing importance, especially with the rapid expansion of the Internet of Things. This concise guide shows you effective ways to collect, persist, and access large-scale time series data for analysis. You’ll explore the theory behind time series databases and learn practical methods for implementing...

Application Development with Qt Creator
Application Development with Qt Creator

Whether you're just getting started with programming, or you've settled on Qt as the GUI toolkit for your project, Qt Creator is a great choice for an Integrated Development Environment (IDE)! In this book, we work to help you make the most of Qt Creator, showing you almost every facet of using Qt Creator, from its configuration...

Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation
Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the...
Python Programming for Arduino
Python Programming for Arduino

Develop practical Internet of Things prototypes and applications with Arduino and Python

About This Book

  • Transform your hardware ideas into real-world applications using Arduino and Python
  • Design and develop hardware prototypes, interactive user interfaces, and cloud-connected...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

unlimited object storage image
Result Page: 353 352 351 350 349 348 347 346 345 344 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy