Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Correspondence Analysis and Data Coding with Java and R (Chapman & Hall/CRC Computer Science & Data Analysis)
Correspondence Analysis and Data Coding with Java and R (Chapman & Hall/CRC Computer Science & Data Analysis)
Developed by Jean-Paul Benzérci more than 30 years ago, correspondence analysis as a framework for analyzing data quickly found widespread popularity in Europe. The topicality and importance of correspondence analysis continue, and with the tremendous computing power now available and new fields of application emerging, its...
Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server
Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server

Take a deep dive into the many uses of dynamic SQL in Microsoft SQL Server. This edition has been updated to use the newest features in SQL Server 2016 and SQL Server 2017 as well as incorporating the changing landscape of analytics and database administration. Code examples have been updated with new system objects and functions to...

Modern X86 Assembly Language Programming: Covers x86 64-bit, AVX, AVX2, and AVX-512
Modern X86 Assembly Language Programming: Covers x86 64-bit, AVX, AVX2, and AVX-512
Since the invention of the personal computer, software developers have used x86 assembly language to create innovative solutions for a wide variety of algorithmic challenges. During the early days of the PC era, it was common practice to code large portions of a program or complete applications using x86 assembly...
Machine Learning Applications Using Python: Cases Studies from Healthcare, Retail, and Finance
Machine Learning Applications Using Python: Cases Studies from Healthcare, Retail, and Finance
Gain practical skills in machine learning for finance, healthcare, and retail. This book uses a hands-on approach by providing case studies from each of these domains: you’ll see examples that demonstrate how to use machine learning as a tool for business enhancement. As a domain expert, you will not only discover how machine...
Modern Algorithms for Image Processing: Computer Imagery by Example Using C#
Modern Algorithms for Image Processing: Computer Imagery by Example Using C#

Utilize modern methods for digital image processing and take advantage of the many time-saving templates provided for all of the projects in this book.

Modern Algorithms for Image Processing approaches the topic of image processing through teaching by example. Throughout the book, you will create projects...

Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

Python Graphics: A Reference for Creating 2D and 3D Images
Python Graphics: A Reference for Creating 2D and 3D Images
Use Python's built-in features to create innovative graphics for data visualization and technical illustrations. This book goes beyond simple commands and libraries to explain how to not only display but also rotate, shade, and edit graphics for any purpose. 

Starting with the essential Python functions to set up a
...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition

An easy-to-follow, step-by-step guide for getting to grips with the real-world application of machine learning algorithms

Key Features

  • Explore statistics and complex mathematics for data-intensive applications
  • Discover new developments in EM algorithm, PCA, and bayesian...
Smarter Homes: How Technology Will Change Your Home Life (Design Thinking)
Smarter Homes: How Technology Will Change Your Home Life (Design Thinking)
Examine the history of smart homes, how technology shapes our lives, and ways you can think about the home when developing new products. This book presents the opportunities in the homespace that will come from understanding the history and multiple players that have contributed to the development of the home in general. ...
Jupyter Cookbook: Over 75 recipes to perform interactive computing across Python, R, Scala, Spark, JavaScript, and more
Jupyter Cookbook: Over 75 recipes to perform interactive computing across Python, R, Scala, Spark, JavaScript, and more

Leverage the power of the popular Jupyter notebooks to simplify your data science tasks without any hassle

Key Features

  • Create and share interactive documents with live code, text and visualizations
  • Integrate popular programming languages such as Python, R, Julia, Scala...
Result Page: 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy