R Deep Learning Essentials
Harness the ability to build algorithms for unsupervised data using deep learning concepts with R
Master the common problems faced such as overfitting of data, anomalous datasets, image recognition, and performance tuning while building the models
Build models relating to neural
Maximum Linux Security (2nd Edition) Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes...
Complete Guide to CISM Certification
Complete Guide to CISMÐ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...
|Result Page: 94 93 92 91 90 89 88 87 86 85 |