Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems
Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems

Insightful projects to master deep learning and neural network architectures using Python and Keras

Key Features

  • Explore deep learning across computer vision, natural language processing (NLP), and image processing
  • Discover best practices for the training of deep neural...
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More

Mine the rich data tucked away in popular social websites such as Twitter, Facebook, LinkedIn, and Instagram. With the third edition of this popular guide, data scientists, analysts, and programmers will learn how to glean insights from social media—including who’s connecting with whom, what they’re...

Practical Machine Learning and Image Processing: For Facial Recognition, Object Detection, and Pattern Recognition Using Python
Practical Machine Learning and Image Processing: For Facial Recognition, Object Detection, and Pattern Recognition Using Python
Gain insights into image-processing methodologies and algorithms, using machine learning and neural networks in Python. This book begins with the environment setup, understanding basic image-processing terminology, and exploring Python concepts that will be useful for implementing the algorithms...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Software Error Detection through Testing and Analysis
Software Error Detection through Testing and Analysis

An in-depth review of key techniques in software error detection

Software error detection is one of the most challenging problems in software engineering. Now, you can learn how to make the most of software testing by selecting test cases to maximize the probability of revealing latent errors. Software Error Detection through...

Practical Convolutional Neural Networks: Implement advanced deep learning models using Python
Practical Convolutional Neural Networks: Implement advanced deep learning models using Python

One stop guide to implementing award-winning, and cutting-edge CNN architectures

Key Features

  • Fast-paced guide with use cases and real-world examples to get well versed with CNN techniques
  • Implement CNN models on image classification, transfer learning, Object Detection,...
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV

A practical guide designed to get you from basics to current state of art in computer vision systems.

Key Features

  • Master the different tasks associated with Computer Vision and develop your own Computer Vision applications with ease
  • Leverage the power of Python,...
Snort Cookbook
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

Advanced Analytics with Spark: Patterns for Learning from Data at Scale
Advanced Analytics with Spark: Patterns for Learning from Data at Scale

In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.

You’ll start with an...

Result Page: 68 67 66 65 64 63 62 61 60 59 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy