Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Intelligent Web: Search, smart algorithms, and big data
The Intelligent Web: Search, smart algorithms, and big data

As we use the Web for social networking, shopping, and news, we leave a personal trail. These days, linger over a Web page selling lamps, and they will turn up at the advertising margins as you move around the Internet, reminding you, tempting you to make that purchase. Search engines such as Google can now look deep into the data on the Web...

Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
The objective of Document Analysis and Recognition (DAR) is to recognize the text and graphical components of a document and to extract information. With first papers dating back to the 1960’s, DAR is a mature but still growing research field with consolidated and known techniques. Optical Character Recognition (OCR) engines are some of the...
Mac OS X Leopard: The Missing Manual
Mac OS X Leopard: The Missing Manual
With Leopard, Apple has unleashed the greatest version of Mac OS X yet, and David Pogue is back with another meticulous Missing Manual to cover the operating system with a wealth of detail. The new Mac OS X 10.5, better known as Leopard, is faster than its predecessors, but nothing's too fast for Pogue and this Missing Manual. It's just one of...
Studying Using the Web: The Student's Guide to Using the Ultimate Information Resource (Routledge Study Guides)
Studying Using the Web: The Student's Guide to Using the Ultimate Information Resource (Routledge Study Guides)
Everyone uses the internet in their school work - but if you aren't careful you can end up plodding around the information fast track. It's time to change up to something more powerful. Knowing how to get the best out of the web doesn't just make it easier and quicker to find the right information. It can also transform your school or college work...
Designing Hyper-V Solutions
Designing Hyper-V Solutions

Deploy Microsoft Virtualization and VDI solutions using real-world Hyper-V configurations

About This Book

  • Get acquainted with the basics of Windows Server Hyper-V 2012 R2 and understand how to efficiently design a highly available virtualization solution
  • Assess your physical server...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Oracle Business Intelligence with Machine Learning: Artificial Intelligence Techniques in OBIEE for Actionable BI
Oracle Business Intelligence with Machine Learning: Artificial Intelligence Techniques in OBIEE for Actionable BI
Use machine learning and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution. This book follows a when-to, why-to, and how-to approach to explain the key steps involved in utilizing the artificial intelligence components now available for a successful OBIEE implementation. Oracle...
MediaWiki Administrators' Tutorial Guide: Install, manage, and customize your MediaWiki installation
MediaWiki Administrators' Tutorial Guide: Install, manage, and customize your MediaWiki installation
MediaWiki is a free tool to create and manage wiki sites. A wiki simplifies the creation of a collaborative environment where anyone can participate and contribute without having knowledge about web programming. MediaWiki is the most popular open-source software used for creating wiki sites.

Wikipedia, the biggest online content
...
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
The simulation of social behavior in a variety of domains is an increasingly important technological tool.

eference survey of social simulation work, Social Simulation: Technologies, Advances and New Discoveries comprehensively collects the most exciting developments in the field. Drawing research contributions from a vibrant...

vSphere Design Best Practices
vSphere Design Best Practices

Apply industry-accepted best practices to design reliable high-performance datacenters for your business needs with this book and ebook.

Overview

  • Learn how to utilize the robust features of VMware to design, architect, and operate a virtual infrastructure using the VMware vSphere platform
  • ...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

unlimited object storage image
Result Page: 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy