Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition

An easy-to-follow, step-by-step guide for getting to grips with the real-world application of machine learning algorithms

Key Features

  • Explore statistics and complex mathematics for data-intensive applications
  • Discover new developments in EM algorithm, PCA, and bayesian...
Machine Learning with Microsoft Technologies: Selecting the Right Architecture and Tools for Your Project
Machine Learning with Microsoft Technologies: Selecting the Right Architecture and Tools for Your Project

Know how to do machine learning with Microsoft technologies. This book teaches you to do predictive, descriptive, and prescriptive analyses with Microsoft Power BI, Azure Data Lake, SQL Server, Stream Analytics, Azure Databricks, HD Insight, and more.

The ability to analyze massive amounts of real-time data and predict...

Super-Recursive Algorithms (Monographs in Computer Science)
Super-Recursive Algorithms (Monographs in Computer Science)
This book introduces the new realm of superrecursive algorithms and the development of mathematical models for them. Although many still believe that only recursive algorithms exist and that only some of them are realizable, there are many situations in which people actually work with superrecursive algorithms....
Effective Java
Effective Java

The Definitive Guide to Java Platform Best Practices–Updated for Java 7, 8, and 9

 

Java has changed dramatically since the previous edition of Effective Java was published shortly after the release of Java 6. This Jolt...

Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications

Get up and running with the fundamentals of Bitcoin and blockchain

Key Features

  • Learn quick, effective, and easy ways to master blockchain and Bitcoin
  • Understand the impact of decentralization and discover ways to tackle it
  • Explore the future of Bitcoin...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Digital Signal Processing Using MATLAB Version 4: A Bookware Companions Problems Book (A volume in the PWS BookWare Companion Series)
Digital Signal Processing Using MATLAB Version 4: A Bookware Companions Problems Book (A volume in the PWS BookWare Companion Series)

From the beginning of the last decade we have witnessed a revolution in computer technology and an explosion in user-friendly applications.This revolution is still continuing today with low-cost personal computer systems that rival the performance of expensive workstations. This technological prowess should be brought to bear on the...

Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
The authors have consolidated their research work in this volume titled Soft Computing for Data Mining Applications. The monograph gives an insight into the research in the ?elds of Data Mining in combination with Soft Computing methodologies. In these days, the data continues to grow - ponentially. Much of the data is implicitly or explicitly...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner

Though your application serves its purpose, it might not be a high performer. Learn techniques to accurately predict code efficiency, easily dismiss inefficient solutions, and improve the performance of your application.

Key Features

  • Explains in detail different algorithms and data...
Data Mining for Systems Biology: Methods and Protocols (Methods in Molecular Biology)
Data Mining for Systems Biology: Methods and Protocols (Methods in Molecular Biology)

The post-genomic revolution is witnessing the generation of petabytes of data annually, with deep implications ranging across evolutionary theory, developmental biology, agriculture, and disease processes. Data Mining for Systems Biology: Methods and Protocols, surveys and demonstrates the science and technology of converting...

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Result Page: 119 118 117 116 115 114 113 112 111 110 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy