Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition

Learn advanced state-of-the-art deep learning techniques and their applications using popular Python libraries

Key Features

  • Build a strong foundation in neural networks and deep learning with Python libraries
  • Explore advanced deep learning techniques and their applications...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques
Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques

Bring a new degree of interconnectivity to your world by building your own intelligent robots

Key Features

  • Leverage fundamentals of AI and robotics
  • Work through use cases to implement various machine learning algorithms
  • Explore Natural Language Processing...
Practical JSF in Java EE 8
Practical JSF in Java EE 8

Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you'll take a tour through the other...

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Learn JavaScript with p5.js: Coding for Visual Learners
Learn JavaScript with p5.js: Coding for Visual Learners
Learn coding from scratch in a highly engaging and visual manner using the vastly popular JavaScript with the programming library p5.js. The skills you will acquire from this book are highly transferable to a myriad of industries and can be used towards building web applications, programmable robots, or generative art. 
...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Examine the problem of maintaining the quality of big data and discover novel solutions. You will learn the four V’s of big data, including veracity, and study the problem from various angles. The solutions discussed are drawn from diverse areas of engineering and math, including machine learning, statistics, formal methods, and...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
MicroStrategy Quick Start Guide: Data analytics and visualizations for Business Intelligence
MicroStrategy Quick Start Guide: Data analytics and visualizations for Business Intelligence

Build reporting applications and dashboards using the different MicroStrategy objects

Key Features

  • Learn the fundamentals of MicroStrategy
  • Use MicroStrategy to get actionable insights from your business data
  • Create visualizations and build intuitive...
Data Science Algorithms in a Week: Top 7 algorithms for scientific computing, data analysis, and machine learning, 2nd Edition
Data Science Algorithms in a Week: Top 7 algorithms for scientific computing, data analysis, and machine learning, 2nd Edition

Build a strong foundation of machine learning algorithms in 7 days

Key Features

  • Use Python and its wide array of machine learning libraries to build predictive models
  • Learn the basics of the 7 most widely used machine learning algorithms within a week
  • Know...
Practical React Native: Build Two Full Projects and One Full Game using React Native
Practical React Native: Build Two Full Projects and One Full Game using React Native
Discover how to use React Native in the real world, from scratch. This book shows you what React Native has to offer, where it came from, and where it’s going. 

You'll begin with a solid foundation of practical knowledge, and then build on it immediately by constructing three different apps. You'll
...
Result Page: 188 187 186 185 184 183 182 181 180 179 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy