Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TensorFlow 2.0 Quick Start Guide: Get up to speed with the newly introduced features of TensorFlow 2.0
TensorFlow 2.0 Quick Start Guide: Get up to speed with the newly introduced features of TensorFlow 2.0

Perform supervised and unsupervised machine learning and learn advanced techniques such as training neural networks.

Key Features

  • Train your own models for effective prediction, using high-level Keras API
  • Perform supervised and unsupervised machine learning and learn...
Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
The Qur'an and Late Antiquity: A Shared Heritage (Oxford Studies in Late Antiquity)
The Qur'an and Late Antiquity: A Shared Heritage (Oxford Studies in Late Antiquity)
In this book, Angelika Neuwirth provides a new approach to understanding the founding text of Islam. Typical exegesis of the Qur'an treats the text teleologically, as a fait accompli finished text, or as a replica or summary of the Bible in Arabic. Instead Neuwirth approaches the Qur'an as the product of a specific...
NGUI for Unity
NGUI for Unity

The NGUI plugin for Unity makes user interfaces so much more efficient and attractive. Learn all about it in this step-by-step tutorial that includes lots of practical exercises, including creating a fun 2D game.

Overview

  • Acquire complete knowledge of every component of NGUI
  • Design and...
Expert Oracle Exadata
Expert Oracle Exadata

Expert Oracle Exadata, 2nd Edition opens up the internals of Oracle's Exadata platform so that you can fully benefit from the most performant and scalable database hardware appliance capable of running Oracle Database. This edition is fully-updated to cover Exadata 5-2 and Oracle Database 12c. If you're new to Exadata,...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)
Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)

Photography tips and advice to help you... + add wow to your images with simple, little-known techniques that change a good shot into a great shot + get pin-sharp, perfectly composed & correctly exposed images, time and time again + choose the best camera and identify only those essential accessories + take stunning portraits of your...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)
Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)

This textbook is the third of three volumes which provide a modern, algorithmic introduction to digital image processing, designed to be used both by learners desiring a firm foundation on which to build, and practitioners in search of critical analysis and concrete implementations of the most important techniques. This volume builds upon the...

The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Frommer's Cambodia & Laos (Frommer's Complete)
Frommer's Cambodia & Laos (Frommer's Complete)

This new first edition guide introduces two exotic destinations fast becoming required stops for globetrotting tourists. Through our expert author, readers are exposed to the rich culture and poignant history in Cambodia and Laos. Discover the region's food and gift markets, lovely beaches and islands, colorful temples, and charming...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy