Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering .NET Machine Learning
Mastering .NET Machine Learning

About This Book

  • Based on .NET framework 4.6.1, includes examples on ASP.NET Core 1.0
  • Set up your business application to start using machine learning techniques
  • Familiarize the user with some of the more common .NET libraries for machine learning
  • Implement...
PHP 7 Data Structures and Algorithms: Implement linked lists, stacks, and queues using PHP
PHP 7 Data Structures and Algorithms: Implement linked lists, stacks, and queues using PHP

Key Features

  • Gain a complete understanding of data structures using a simple approach
  • Analyze algorithms and learn when you should apply each solution
  • Explore the true potential of functional data structures

Book Description

PHP has always...

Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Learn to Program with Minecraft: Transform Your World with the Power of Python
Learn to Program with Minecraft: Transform Your World with the Power of Python

You’ve bested creepers, traveled deep into caves, and maybe even gone to The End and back—but have you ever transformed a sword into a magic wand? Built a palace in the blink of an eye? Designed your own color-changing disco dance floor?

In Learn to Program with Minecraft®, you’ll do all this and
...

Getting Started with Greenplum for Big Data Analytics
Getting Started with Greenplum for Big Data Analytics

Big Data started off as a technology buzzword rapidly growing into the headline agenda of several corporate strategies across industry verticals. With the amount of structured and unstructured data available to organizations exploding, analysis of these large data sets is increasingly becoming a key basis of competition, productivity growth,...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
The Windows 10 Productivity Handbook: Discover Expert Tips, Tricks, and Hidden Features in Windows 10
The Windows 10 Productivity Handbook: Discover Expert Tips, Tricks, and Hidden Features in Windows 10
Use the tricks and hidden features in this guide to become more productive with Windows 10. You will save time, achieve more, and feel in control like never before.

Author Mike Halsey is a Microsoft MVP (Most Valuable Professional) awardee and technical expert. As the author of Windows 7, 8, and 10 Troubleshooting
...
Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites
The combination of PHP and MySQL is the most convenient approach to dynamic, database-driven web design, holding its own in the face of challenges from integrated frameworks—such as Ruby on Rails—that are harder to learn. Due to its open source roots (unlike the competing Microsoft .NET framework), it is...
Data-Driven Security: Analysis, Visualization and Dashboards
Data-Driven Security: Analysis, Visualization and Dashboards

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...

Result Page: 41 40 39 38 37 36 35 34 33 32 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy