Home | Amazing | Today | Tags | Publishers | Years | Search 
Taming Text: How to Find, Organize, and Manipulate It
Taming Text: How to Find, Organize, and Manipulate It

Summary

Taming Text, winner of the 2013 Jolt Awards for Productivity, is a hands-on, example-driven guide to working with unstructured text in the context of real-world applications. This book explores how to automatically organize text using approaches such as full-text search, proper name recognition,...

Intelligent Buildings and Building Automation
Intelligent Buildings and Building Automation

Giving you a combination of general principles, applied practice and information on the state-of-the-art, this book will give you the information you need to incorporate the latest systems and technologies into your building projects. It focuses on a number of important issues, such as:

  • Network communication protocols and...
Intuitive Probability and Random Processes using MATLAB
Intuitive Probability and Random Processes using MATLAB

Intuitive Probability and Random Processes using MATLAB® is an introduction to probability and random processes that merges theory with practice. Based on the author’s belief that only "hands-on" experience with the material can promote intuitive understanding, the approach is to motivate the need...

TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition
TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition

Skip the theory and get the most out of Tensorflow to build production-ready machine learning models

Key Features

  • Exploit the features of Tensorflow to build and deploy machine learning models
  • Train neural networks to tackle real-world problems in Computer Vision and...
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum

Key Features

  • Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
  • Explore various solution-based recipes to build smart contracts and foolproof...
Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease
Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease

Enhance the power of NumPy and start boosting your scientific computing capabilities

Key Features

  • Grasp all aspects of numerical computing and understand NumPy
  • Explore examples to learn exploratory data analysis (EDA), regression, and clustering
  • Access...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Hands-On DevOps with Vagrant: Implement end-to-end DevOps and infrastructure management using Vagrant
Hands-On DevOps with Vagrant: Implement end-to-end DevOps and infrastructure management using Vagrant

Use Vagrant to easily build complete development environments

Key Features

  • Implement DevOps with Vagrant effectively
  • Integrate Vagrant with different tools such as Puppet, Chef, and Docker
  • Manage infrastructure with a practical approach

...

Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition

A practical guide to Windows Server 2019 and PowerShell

Key Features

  • Use PowerShell to effectively configure and administer Windows Server 2019
  • Improve the performance of new features such as DevOps and containers using PowerShell
  • Enhance PowerShell's...
Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition
Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition

Unleash the power of VMware vSphere 6.7 to develop a powerful, flexible, and secure digital infrastructure

Key Features

  • Explore management, security, scalability, and availability with vSphere 6.7
  • Design, deploy, and manage VMware vSphere virtual datacenters
  • ...
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools

Key Features

  • Deal with remote network servers using SSH, FTP, SNMP and LDAP protocols.
  • Design multi threaded and event-driven architectures...
Pro JavaFX 9: A Definitive Guide to Building Desktop, Mobile, and Embedded Java Clients
Pro JavaFX 9: A Definitive Guide to Building Desktop, Mobile, and Embedded Java Clients

At the annual JavaOne conference in May 2007, Sun Microsystems announced a new product family named JavaFX. Its stated purpose includes enabling the development and deployment of content-rich applications on consumer devices such as cell phones, televisions, in-dash car systems, and browsers. Josh Marinacci, a software engineer at Sun, made...

Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy