Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Deep Learning with Python: A Hands-on Introduction
Deep Learning with Python: A Hands-on Introduction
Discover the practical aspects of implementing deep-learning solutions using the rich Python ecosystem. This book bridges the gap between the academic state-of-the-art and the industry state-of-the-practice by introducing you to deep learning frameworks such as Keras, Theano, and Caffe. The practicalities of these frameworks is often...
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

Using R for Introductory Statistics (Chapman & Hall/CRC The R Series)
Using R for Introductory Statistics (Chapman & Hall/CRC The R Series)

The cost of statistical computing software has precluded many universities from installing these valuable computational and analytical tools. R, a powerful open-source software package, was created in response to this issue. It has enjoyed explosive growth since its introduction, owing to its coherence, flexibility, and free availability....

Data Structures & Algorithm Analysis in C++
Data Structures & Algorithm Analysis in C++

Data Structures and Algorithm Analysis in C++ is an advanced algorithms book that bridges the gap between traditional CS2 and Algorithms Analysis courses.

As the speed and power of computers increases, so does the need for effective programming and algorithm analysis. By approaching these skills in tandem, Mark Allen...

SQL Server 2012 T-SQL Recipes: A Problem-Solution Approach (Recipes Apress)
SQL Server 2012 T-SQL Recipes: A Problem-Solution Approach (Recipes Apress)
Processing is probably the best-known creative coding environment that helps you bridge the gap between programming and art. It enables designers, artists, architects, students, and many others, to explore graphics programming and computational art in an easy way, thus helping boost creativity.

Processing 2:
...
Practical Statistics for Data Scientists: 50 Essential Concepts
Practical Statistics for Data Scientists: 50 Essential Concepts

Statistical methods are a key part of of data science, yet very few data scientists have any formal statistics training. Courses and books on basic statistics rarely cover the topic from a data science perspective. This practical guide explains how to apply various statistical methods to data science, tells you how to avoid their...

Cloud Standards: Agreements That Hold Together Clouds
Cloud Standards: Agreements That Hold Together Clouds

Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...

Fuzzy Cognitive Maps for Applied Sciences and Engineering: From Fundamentals to Extensions and Learning Algorithms
Fuzzy Cognitive Maps for Applied Sciences and Engineering: From Fundamentals to Extensions and Learning Algorithms

Fuzzy Cognitive Maps (FCM) constitute cognitive models in the form of fuzzy directed graphs consisting of two basic elements: the nodes, which basically correspond to “concepts” bearing different states of activation depending on the knowledge they represent, and the “edges” denoting the causal effects...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Voice and Speech Quality Perception: Assessment and Evaluation (Signals and Communication Technology)
Voice and Speech Quality Perception: Assessment and Evaluation (Signals and Communication Technology)
Foundations of Voice and Speech Quality Perception starts out with the fundamental question of: "How do listeners perceive voice and speech quality and how can these processes be modeled?" Any quantitative answers require measurements. This is natural for physical quantities but harder to imagine for perceptual measurands. This book...
Result Page: 53 52 51 50 49 48 47 46 45 44 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy