Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython
Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython

Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. Updated for Python 3.6, the second edition of this hands-on guide is packed with practical case studies that show you how to solve a broad set of data analysis problems effectively. You’ll learn the latest versions of pandas,...

IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
Python for Data Analysis
Python for Data Analysis

The scientific Python ecosystem of open source libraries has grown substantially over the last 10 years. By late 2011, I had long felt that the lack of centralized learning resources for data analysis and statistical applications was a stumbling block for new Python programmers engaged in such work. Key projects for data...

DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...

The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript
The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript
There was considerable enthusiasm about the new capabilities of HTML5, and even suggestions that no other technologies or products are necessary to produce dynamic, engrossing, interactive websites. That may be overstating things, but it is true the new features are exciting. HTML is HTML5. It now is possible, using just HTML,...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Handbook of Research on User Interface Design and Evaluation for Mobile Technology
Handbook of Research on User Interface Design and Evaluation for Mobile Technology
In recent years, mobile technology has been one of the major growth areas in computing. Designing the user interface for mobile applications, however, is a very complex undertaking which is made even more challenging by the rapid technological developments in mobile hardware. Mobile human-computer interaction, unlike desktop-based interaction, must...
Professional Java, JDK 5 Edition
Professional Java, JDK 5 Edition
Java continues to be the dominant language for building server applications, and the latest update to the Java platform—JDK 5—boasts many new features, including a metadata facility, generics, autoboxing, and improved user interface performance. Building upon Ivor Horton's Beginning Java, this book provides insight into these...
Mahara 1.2 E-Portfolios: Beginner's Guide
Mahara 1.2 E-Portfolios: Beginner's Guide

Mahara is a user-centred environment with a permissions framework that enables different views of an e-portfolio to be easily managed. These views helps you display your artefacts - text files, spreadsheets, images, and videos - in a way you choose and to the people you want. You can also create online communities and social networks through...

Cell Culture Technology for Pharmaceutical and Cell-Based Therapies (Biotechnology and Bioprocessing)
Cell Culture Technology for Pharmaceutical and Cell-Based Therapies (Biotechnology and Bioprocessing)

Edited by two of the most distinguished pioneers in genetic manipulation and bioprocess technology, this bestselling reference presents a comprehensive overview of current cell culture technology used in the pharmaceutical industry. Contributions from several leading researchers showcase the importance of gene discovery and genomic technology...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy