Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Here we have a comprehensive, problem-oriented, engineering perspective on the uses of neural nets, fuzzy systems, and hybrids that emphasizes practical solutions to everyday artificial intelligence (AI) problems over abstract theoretical noodling. Intended for upper-division students and postgraduates who need a...
The Python Standard Library by Example (Developer's Library)
The Python Standard Library by Example (Developer's Library)

Distributed with every copy of Python, the standard library contains hundreds of modules that provide tools for interacting with the operating system, interpreter, and Internet. All of them are tested and ready to be used to jump start the development of your applications. This book presents selected examples demonstrating how to use the most...

xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.

xUnit Test Patterns is the...

Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map
Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map

Understanding your company’s data has never been easier than with Microsoft’s new Power BI package for Excel 2013. Consisting of four powerful tools—Power Pivot, Power View, Power Query and Power Maps—Power BI makes self-service business intelligence a reality for a wide range of users, bridging the traditional gap...

Italian Verb Drills, Third Edition (Drills Series)
Italian Verb Drills, Third Edition (Drills Series)

Get the expert instruction you want and the practice you need with the conjugation of Italian verbs--with bonus online interactive exercises

Italian Verb Drills helps you overcome the obstacles of Italian verbs, so that you can confidently use verbs when expressing yourself in Italian. This book explains...

Django: Web Development with Python
Django: Web Development with Python

About This Book

  • Explore the best practices to develop applications of a superior quality with Django framework
  • Unravel the common problems of web development in Django
  • This course teaches you major Django functions and will help you improve your skills by developing models, forms, views, and...
Big Data Analytics with Spark: A Practitioner's Guide to Using Spark for Large Scale Data Analysis
Big Data Analytics with Spark: A Practitioner's Guide to Using Spark for Large Scale Data Analysis

Big Data Analytics with Spark is a step-by-step guide for learning Spark, which is an open-source fast and general-purpose cluster computing framework for large-scale data analysis. You will learn how to use Spark for different types of big data analytics projects, including batch, interactive, graph, and stream data analysis as well...

Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE: Developing Cyber-Physical Systems (The MK/OMG Press)
Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE: Developing Cyber-Physical Systems (The MK/OMG Press)

Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software.

...
Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

Mastering Machine Learning With scikit-learn
Mastering Machine Learning With scikit-learn

Apply effective learning algorithms to real-world problems using scikit-learn

About This Book

  • Design and troubleshoot machine learning systems for common tasks including regression, classification, and clustering
  • Acquaint yourself with popular machine learning algorithms, including...
Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
Result Page: 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy