Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition

Learn advanced state-of-the-art deep learning techniques and their applications using popular Python libraries

Key Features

  • Build a strong foundation in neural networks and deep learning with Python libraries
  • Explore advanced deep learning techniques and their applications...
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Discover the potential applications, challenges, and opportunities of deep learning from a business perspective with technical examples. These applications include image recognition, segmentation and annotation, video processing and annotation, voice recognition, intelligent personal assistants, automated translation, and...
Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Practical Data Science: A Guide to Building the Technology Stack for Turning Data Lakes into Business Assets
Practical Data Science: A Guide to Building the Technology Stack for Turning Data Lakes into Business Assets
Learn how to build a data science technology stack and perform good data science with repeatable methods. You will learn how to turn data lakes into business assets.

The data science technology stack demonstrated in Practical Data Science is built from components in general use in the industry. Data...
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Deep Learning with Azure: Building and Deploying Artificial Intelligence Solutions on the Microsoft AI Platform
Deep Learning with Azure: Building and Deploying Artificial Intelligence Solutions on the Microsoft AI Platform
Get up-to-speed with Microsoft's AI Platform. Learn to innovate and accelerate with open and powerful tools and services that bring artificial intelligence to every data scientist and developer.

Artificial Intelligence (AI) is the new normal. Innovations in deep learning algorithms and hardware...
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies.

Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book...

Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth

Get your financial life in order. This comprehensive and objective guidebook will help you grow your net worth on a steady and increasing basis, regardless of your income level.

This new and expanded edition covers changes and strategies to maximize financial benefits and planning resulting from the recent tax legislation,
...
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Rely on this robust and thorough guide to build and maintain successful test automation. As the software industry shifts from traditional waterfall paradigms into more agile ones, test automation becomes a highly important tool that allows your development teams to deliver software at an ever-increasing pace without compromising...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Result Page: 534 533 532 531 530 529 528 527 526 525 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy