Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Natural Language Processing Recipes: Unlocking Text Data with Machine Learning and Deep Learning using Python
Natural Language Processing Recipes: Unlocking Text Data with Machine Learning and Deep Learning using Python
Implement natural language processing applications with Python using a problem-solution approach. This book has numerous coding exercises that will help you to quickly deploy natural language processing techniques, such as text classification, parts of speech identification,...
Evidence-based Ayurveda: Defining a New Scientific Path
Evidence-based Ayurveda: Defining a New Scientific Path

This groundbreaking work calls for the overhaul of traditional Ayurveda and its transformation into a progressive, evidence-based practice.

This book begins by looking back at the research of the last three centuries, Indian medicinal plants, and Ayurveda in a twenty-first-century context. The first part of this book...

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras

Deep learning simplified by taking supervised, unsupervised, and reinforcement learning to the next level using the Python ecosystem

Key Features

  • Build deep learning models with transfer learning principles in Python
  • implement transfer learning to solve real-world research...
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML
Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML

Bring magic to your mobile apps using TensorFlow Lite and Core ML

Key Features

  • Explore machine learning using classification, analytics, and detection tasks.
  • Work with image, text and video datasets to delve into real-world tasks
  • Build apps for Android and...
Python Artificial Intelligence Projects for Beginners: Get up and running with Artificial Intelligence using 8 smart and exciting AI applications
Python Artificial Intelligence Projects for Beginners: Get up and running with Artificial Intelligence using 8 smart and exciting AI applications

Build smart applications by implementing real-world artificial intelligence projects

Key Features

  • Explore a variety of AI projects with Python
  • Get well-versed with different types of neural networks and popular deep learning algorithms
  • Leverage popular...
Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Atlas of Clinically Important Fungi
Atlas of Clinically Important Fungi

Although there are many texts that provide quality information for the identification of fungi, researchers and technologists rarely have time to read the text. Most are rushed for time and seek morphological information that helps guide them to the identification of fungi.

The Atlas of Clinically Important Fungi provides...

Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)
Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)

Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health...

The C++ Programming Language: Special Edition (3rd Edition)
The C++ Programming Language: Special Edition (3rd Edition)

More than three-quarters of a million programmers have benefited from this book in all of its editions

 

Written by Bjarne Stroustrup, the creator of C++, this is the world's most trusted and widely read book on C++.

 

...
Result Page: 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy