Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python

*** Book also provides you FREE Access to Online Instructional Videos. See video codes in the book ***

This book is about the 23 common GoF (Gang of Four) Design Patterns implemented and in Python.

A Design Pattern is a description or template that can be repeatedly applied to a commonly recurring...

Probability: With Applications and R
Probability: With Applications and R

An introduction to probability at the undergraduate level

Chance and randomness are encountered on a daily basis. Authored by a highly qualified professor in the field, Probability: With Applications and R delves into the theories and applications essential to obtaining a thorough understanding of probability.

...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Supply Chain Planning, Second Edition: An Analytics-based Approach
Supply Chain Planning, Second Edition: An Analytics-based Approach
The book is intended for supply chain professionals, as well as for graduate and advanced undergraduate students. Practitioners will obtain valuable new insights and examples of implementable frameworks and methods for managing their supply chain functions and organizations. Students will develop an understanding of real-world approaches for...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Design Patterns in Modern C++: Reusable Approaches for Object-Oriented Software Design
Design Patterns in Modern C++: Reusable Approaches for Object-Oriented Software Design
Apply modern C++17 to the implementations of classic design patterns. As well as covering traditional design patterns, this book fleshes out new patterns and approaches that will be useful to C++ developers. The author presents concepts as a fun investigation of how problems can be solved in different ways, along the way using varying...
Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Markov Models for Pattern Recognition: From Theory to Applications
Markov Models for Pattern Recognition: From Theory to Applications

The development of pattern recognition methods on the basis of so-called Markov models is tightly coupled to the technological progress in the field of automatic speech recognition. Today, however, Markov chain and hidden Markov models are also applied in many other fields where the task is the modeling and analysis of chronologically...

Enterprise Dashboards: Design and Best Practices for IT
Enterprise Dashboards: Design and Best Practices for IT
Advance praise for Enterprise Dashboards:

"Corporate dashboards are, no doubt, a part of the new business imperative. Not only do organizations need to know about these valuable tools, but it's critical they know how to implement dashboards strategically in their organizations. Enterprise Dashboards offers a timely tutorial for corporate...

Hands-On Markov Models with Python: Implement probabilistic models for learning complex data sequences using the Python ecosystem
Hands-On Markov Models with Python: Implement probabilistic models for learning complex data sequences using the Python ecosystem

Unleash the power of unsupervised machine learning in Hidden Markov Models using TensorFlow, pgmpy, and hmmlearn

Key Features

  • Build a variety of Hidden Markov Models (HMM)
  • Create and apply models to any sequence of data to analyze, predict, and extract valuable...
A Mathematical Introduction to Robotic Manipulation
A Mathematical Introduction to Robotic Manipulation

A Mathematical Introduction to Robotic Manipulation presents a mathematical formulation of the kinematics, dynamics, and control of robot manipulators. It uses an elegant set of mathematical tools that emphasizes the geometry of robot motion and allows a large class of robotic manipulation problems to be analyzed within a unified...

Functional Interfaces in Java: Fundamentals and Examples
Functional Interfaces in Java: Fundamentals and Examples
Reduce development time by organizing your programs as chains of functional interfaces and see that the advantages of using functional interfaces include the flexibility and power of inlined functional chains and reuse of functional methods utilized throughout the Java API. You’ll see how complex logical expressions can be reduced...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy