Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bioinformatics with Python Cookbook: Learn how to use modern Python bioinformatics libraries and applications to do cutting-edge research in computational biology, 2nd Edition
Bioinformatics with Python Cookbook: Learn how to use modern Python bioinformatics libraries and applications to do cutting-edge research in computational biology, 2nd Edition

Discover modern, next-generation sequencing libraries from Python ecosystem to analyze large amounts of biological data

Key Features

  • Perform complex bioinformatics analysis using the most important Python libraries and applications
  • Implement next-generation sequencing,...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
This book offers a comprehensive model for explaining the success and failure of cities in nurturing startups, presents detailed case studies of how participants in that model help or hinder startup activity, and shows how to apply these lessons to boost local startup activity.

Startup Cities explains the...

Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
Scala Machine Learning Projects: Build real-world machine learning and deep learning projects with Scala
Scala Machine Learning Projects: Build real-world machine learning and deep learning projects with Scala

Powerful smart applications using deep learning algorithms to dominate numerical computing, deep learning, and functional programming.

Key Features

  • Explore machine learning techniques with prominent open source Scala libraries such as Spark ML, H2O, MXNet, Zeppelin, and DeepLearning4j
  • ...
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud

Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book?Amazon, Microsoft, Google, and PythonAnywhere.

You will work through a series of common Python data science problems...

Practical TLA+: Planning Driven Development
Practical TLA+: Planning Driven Development
Learn how to design complex, correct programs and fix problems before writing a single line of code. This book is a practical, comprehensive resource on TLA+ programming with rich, complex examples. Practical TLA+ shows you how to use TLA+ to specify a complex system and test the design itself for...
Clojure for Java Developers
Clojure for Java Developers

Key Features

  • Write apps for the multithreaded world with Clojure's flavor of functional programming
  • Discover Clojure's features and advantages and use them in your existing projects
  • The book is designed so that you'll be able put to use your existing skills and software knowledge...
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Mathematics for Electrical Engineering and Computing
Mathematics for Electrical Engineering and Computing
Mathematics for Electrical Engineering and Computing embraces many applications of modern mathematics, such as Boolean Algebra and Sets and Functions, and also teaches both discrete and continuous systems - particularly vital for Digital Signal Processing (DSP). In addition, as most modern engineers are required to study software,...
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Next Generation Transport Networks: Data, Management, and Control Planes
Next Generation Transport Networks: Data, Management, and Control Planes

Covering past, present and future transport networks using three layered planes written by experts in the field.

Targeted at both practitioners and academics as a single source to get an understanding of how transport networks are built and operated

Explains technologies enabling the next generation transport...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy