Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

DevOps with Kubernetes: Accelerating software delivery with container orchestrators
DevOps with Kubernetes: Accelerating software delivery with container orchestrators

Learn to implement DevOps using Docker & Kubernetes.

About This Book

  • Learning DevOps, container, and Kubernetes within one book.
  • Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently.
  • A practical guide towards container management and...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Scalable Big Data Architecture: A practitioners guide to choosing relevant Big Data architecture
Scalable Big Data Architecture: A practitioners guide to choosing relevant Big Data architecture

This book highlights the different types of data architecture and illustrates the many possibilities hidden behind the term "Big Data", from the usage of No-SQL databases to the deployment of stream analytics architecture, machine learning, and governance.

Scalable Big Data Architecture covers real-world,...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Microsoft SQL Server 2012 Step by Step (Step by Step Developer)
Microsoft SQL Server 2012 Step by Step (Step by Step Developer)

Your hands-on, step-by-step guide to building applications with Microsoft SQL Server 2012

Teach yourself the programming fundamentals of SQL Server 2012—one step at a time. Ideal for beginning SQL Server database administrators and developers, this tutorial provides clear guidance and practical, learn-by-doing...

Business Calculus Demystified
Business Calculus Demystified

Take the FEAR OUT of Business Calculus

Business Calculus Demystified clarifies the concepts and processes of calculus and demonstrates their applications to the workplace. Best-selling math author Rhonda Huettenmueller uses the same combination of winning step-by-step teaching techniques and real-world business and...

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...

Programming Elastic MapReduce: Using AWS Services to Build an End-to-End Application
Programming Elastic MapReduce: Using AWS Services to Build an End-to-End Application

Although you don’t need a large computing infrastructure to process massive amounts of data with Apache Hadoop, it can still be difficult to get started. This practical guide shows you how to quickly launch data analysis projects in the cloud by using Amazon Elastic MapReduce (EMR), the hosted Hadoop framework in Amazon Web...

Hadoop Beginner's Guide
Hadoop Beginner's Guide

Get your mountain of data under control with Hadoop. This guide requires no prior knowledge of the software or cloud services - just a willingness to learn the basics from this practical step-by-step tutorial.

Overview

  • Learn tools and techniques that let you approach big data with relish and not...
Automating System Administration with Perl: Tools to Make You More Efficient
Automating System Administration with Perl: Tools to Make You More Efficient

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy