Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Android Game Programming by Example
Android Game Programming by Example

Harness the power of the Android SDK by building three immersive and captivating games

About This Book

  • Implement the critical main game loop and structure your games to enable an array of advanced features
  • Animate your characters with sprite sheets, add multiple scrolling parallax...
Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004.

The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from...

The Practical Guide to Defect Prevention (Best Practices)
The Practical Guide to Defect Prevention (Best Practices)

This practical, hands-on guide captures, categorizes, and builds a process of best practices to avoid creating defects during the development process—rather than fixing them after extensive analysis. While there are various proprietary and competing standards for reducing software defects, these methods suffer from issues surrounding...

Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference on Structural Dynamics, 2013
Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference on Structural Dynamics, 2013

Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference and Exposition on Structural Dynamics, 2013, the third volume of seven from the Conference, brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on...

Cancer Diagnostics: Current and Future Trends (Contemporary Cancer Research)
Cancer Diagnostics: Current and Future Trends (Contemporary Cancer Research)

In the past, many tumor marker laboratory tests have not been sensitive enough for the very early detection of cancer. However, many of them have nonetheless proved useful in monitoring therapy, following the course of the tumor, and predicting prog­ nosis. Today, cancer may be viewed as a genetic disease with various specific chromo­...

DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

unlimited object storage image
Result Page: 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy