 |
|
 Native Docker Clustering with Swarm
Key Features
-
Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
-
Optimize Swarm and SwarmKit features for scaling massive applications through containers.
-
Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
... |  |  A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R
The only how-to guide offering a unified, systemic approach to acquiring, cleaning, and managing data in R
Every experienced practitioner knows that preparing data for modeling is a painstaking, time-consuming process. Adding to the difficulty is that most modelers learn the steps involved in cleaning and managing data... |  |  Deploying Raspberry Pi in the Classroom
Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to navigate the hardware and software choices you face.
Deploying Raspberry Pi in the Classroom equips you with the skills and knowledge to plan and execute a deployment of Raspberry Pi computers in the classroom. Teachers and IT... |
|
|
|
 Machine Learning and Security: Protecting Systems with Data and Algorithms
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security... |  |  Atlas of Clinically Important Fungi
Although there are many texts that provide quality information for the identification of fungi, researchers and technologists rarely have time to read the text. Most are rushed for time and seek morphological information that helps guide them to the identification of fungi.
The Atlas of Clinically Important Fungi provides... |  |  Intermediate Security Testing with Kali Linux 2
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux... |
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |