Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Mastering SVG: Ace web animations, visualizations, and vector graphics with HTML, CSS, and JavaScript
Mastering SVG: Ace web animations, visualizations, and vector graphics with HTML, CSS, and JavaScript

Take the plunge and develop cross-browser-compatible and responsive web designs with SVG

Key Features

  • Master the art of custom animations and visualizations with SVG, CSS, and JavaScript
  • Combine SVG with third-party libraries and frameworks such as React, JQuery, D3, and...
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras

Deep learning simplified by taking supervised, unsupervised, and reinforcement learning to the next level using the Python ecosystem

Key Features

  • Build deep learning models with transfer learning principles in Python
  • implement transfer learning to solve real-world research...
Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)
Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

This book uses the 2001 anthrax attacks as its point of departure for an analysis of the past, present, and future of America's preparedness to deal with major challenges to public health, including bioterrorism and pandemic flu. The study identified the strength and weaknesses of the system while making recommendations for improvements....

Introducing the MySQL 8 Document Store
Introducing the MySQL 8 Document Store
NoSQL has been given a lot of hype in recent years. As with most new technologies, the underlying principles are rarely truly new, rather, it is the unique combination of known technologies that forms and transforms the whole to become more than the sum of its parts. This is especially true for MySQL 8 and the new MySQL Document...
Machine Learning in Java: Helpful techniques to design, build, and deploy powerful machine learning applications in Java, 2nd Edition
Machine Learning in Java: Helpful techniques to design, build, and deploy powerful machine learning applications in Java, 2nd Edition

Leverage the power of Java and its associated machine learning libraries to build powerful predictive models

Key Features

  • Solve predictive modeling problems using the most popular machine learning Java libraries
  • Explore data processing, machine learning, and NLP concepts...
MongoDB in Action: Covers MongoDB version 3.0
MongoDB in Action: Covers MongoDB version 3.0

Summary

MongoDB in Action, Second Edition is a completely revised and updated version. It introduces MongoDB 3.0 and the document-oriented database model. This perfectly paced book gives you both the big picture you'll need as a developer and enough low-level detail to satisfy system engineers.

...
R Reference Manual: Base Package, Vol. 1
R Reference Manual: Base Package, Vol. 1
This manual is the first volume of the reference documentation for R, a powerful free environment for statistical computing and graphics. The main commands of the base package of R are described in this volume. A second companion volume "The R Reference Manual - Base Package - Volume 2" (ISBN 0-9546120-1-9) covers the R commands for...
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle is a complete, hands-on guide for instructors learning how to use Moodle, the popular course management system (CMS) that enables remote web-based learning and supplements traditional classroom learning. Updated for the latest version, this new edition explains exactly how Moodle works by offering plenty of examples,...
MongoDB Basics
MongoDB Basics

Need a quick and easy to understand introduction to MongoDB and NoSQL databases? MongoDB Basics, from The Definitive Guide to MongoDB, 2E, shows you how a document-oriented database system differs from a relational database, and how to install and get started using it. You'll also learn MongoDB design basics, including...

Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Result Page: 79 78 77 76 75 74 73 72 71 70 69 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy