Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Discover the potential applications, challenges, and opportunities of deep learning from a business perspective with technical examples. These applications include image recognition, segmentation and annotation, video processing and annotation, voice recognition, intelligent personal assistants, automated translation, and...
Building Intelligent Systems: A Guide to Machine Learning Engineering
Building Intelligent Systems: A Guide to Machine Learning Engineering
Produce a fully functioning Intelligent System that leverages machine learning and data from user interactions to improve over time and achieve success.


This book teaches you how to build an Intelligent System from end to end and leverage machine learning in practice. You will understand how to apply your
...
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies.

Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book...

Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Examine the problem of maintaining the quality of big data and discover novel solutions. You will learn the four V’s of big data, including veracity, and study the problem from various angles. The solutions discussed are drawn from diverse areas of engineering and math, including machine learning, statistics, formal methods, and...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Optimizing Data-to-Learning-to-Action: The Modern Approach to Continuous Performance Improvement for Businesses
Optimizing Data-to-Learning-to-Action: The Modern Approach to Continuous Performance Improvement for Businesses

Apply a powerful new approach and method that ensures continuous performance improvement for your business. You will learn how to determine and value the people, process, and technology-based solutions that will optimize your organization’s data-to-learning-to-action processes.

This book describes in...

Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming
Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming

A definitive guide to mastering and implementing concurrency patterns in your applications

Key Features

  • Build scalable apps with patterns in multithreading, synchronization, and functional programming
  • Explore the parallel programming and multithreading techniques to make...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
Scala Machine Learning Projects: Build real-world machine learning and deep learning projects with Scala
Scala Machine Learning Projects: Build real-world machine learning and deep learning projects with Scala

Powerful smart applications using deep learning algorithms to dominate numerical computing, deep learning, and functional programming.

Key Features

  • Explore machine learning techniques with prominent open source Scala libraries such as Spark ML, H2O, MXNet, Zeppelin, and DeepLearning4j
  • ...
Result Page: 130 129 128 127 126 125 124 123 122 121 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy