Learn how to use TensorFlow 2.0 to build machine learning and deep learning models with complete examples.
The book begins with introducing TensorFlow 2.0 framework and the major changes from its last release. Next, it focuses on building Supervised Machine Learning models using TensorFlow 2.0....
There is no such thing as an easy sale. However, selling to an existing customer?whether by refreshing an old product or introducing a new and different product?is often easier, faster, and returns higher margins. Centering your organization’s sales strategy on your installed base is a smart and proven way to achieve...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Deploy and Maintain an Integrated MDS Architecture
Harness your master data and grow revenue while reducing...
In a global, highly competitive environment, organizations face increasing economic pressure and customer demands for more complex products and services. Hybrid algorithms have the potential to play an important role in helping organizations achieve cost reduction and increased product development.
Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems.
Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects...
Reduce development time by organizing your programs as chains of functional interfaces and see that the advantages of using functional interfaces include the flexibility and power of inlined functional chains and reuse of functional methods utilized throughout the Java API. You’ll see how complex logical expressions can be reduced...
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.
Implement application programming interface (API) usability, security, availability, reliability, and scalability to extend your company’s market and potentially generate revenue. Businesses know they need to extend their markets into the digital world, and expose internal data to the Internet. This book shows how stakeholders...
Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book?Amazon, Microsoft, Google, and PythonAnywhere.
You will work through a series of common Python data science problems...
Discover the potential applications, challenges, and opportunities of deep learning from a business perspective with technical examples. These applications include image recognition, segmentation and annotation, video processing and annotation, voice recognition, intelligent personal assistants, automated translation, and...