Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
R Deep Learning Projects: Master the techniques to design and develop neural network models in R
R Deep Learning Projects: Master the techniques to design and develop neural network models in R

5 real-world projects to help you master deep learning concepts

Key Features

  • Master the different deep learning paradigms and build real-world projects related to text generation, sentiment analysis, fraud detection, and more
  • Get to grips with R's impressive range of...
Microbial Genomics and Drug Discovery
Microbial Genomics and Drug Discovery

Exploring innovative routes of drug discovery in the postgenomic era, Microbial Genomics and Drug Discovery examines bioinformatic and genomic approaches for the identification, detection, selection, and validation of new antibacterial targets and vaccine candidates. The book discusses potential pathways for effective infection control,...

Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information extraction regards the processes of structuring and combining content that is explicitly stated or implied in one or multiple unstructured information sources. It involves a semantic classification and linking of certain pieces of information and is considered as a light form of content understanding by the machine. Currently, there is...
OpenCL Parallel Programming Development Cookbook
OpenCL Parallel Programming Development Cookbook

OpenCL (Open Computing Language) is the first royalty-free standard for cross platform, parallel programming of modern processors found in personal computers, servers, mobiles, and embedded devices. OpenCL greatly improves speed and responsiveness for a wide spectrum of applications in numerous market categories, from gaming and entertainment...

Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Hepatitis Delta Virus (Current Topics in Microbiology and Immunology)
Hepatitis Delta Virus (Current Topics in Microbiology and Immunology)

Hepatitis delta virus (HDV), which causes severe acute and chronic liver disease, was discovered nearly 30 years ago following the detection of a novel antigen-antibody system in hepatitis B virus carriers. HDV has continued to surprise and fascinate medical science ever since. This volume reviews recent developments in HDV research, from...

Neoplasms of the Colon, Rectum, and Anus, Second Edition
Neoplasms of the Colon, Rectum, and Anus, Second Edition

Colorectal cancer is the second-leading cause of cancer-related death in the Western World. This Second Edition analyzes the genetics, mechanisms, and development of colorectal carcinoma and supplies the latest research and recommendations on the detection, treatment, and prevention of malignancies of the colon, rectum, and anus.

...
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications

Recipe-based approach to tackle the most common problems in Computer Vision by leveraging the functionality of OpenCV using Python APIs

Key Features

  • Build computer vision applications with OpenCV functionality via Python API
  • Get to grips with image processing, multiple...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy