Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
MongoDB Basics
MongoDB Basics

Need a quick and easy to understand introduction to MongoDB and NoSQL databases? MongoDB Basics, from The Definitive Guide to MongoDB, 2E, shows you how a document-oriented database system differs from a relational database, and how to install and get started using it. You'll also learn MongoDB design basics, including...

The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...

Programming Pig
Programming Pig

This guide is an ideal learning tool and reference for Apache Pig, the open source engine for executing parallel data flows on Hadoop. With Pig, you can batch-process data without having to create a full-fledged application—making it easy for you to experiment with new datasets.

Programming Pig introduces...

Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

Explore and master the most important algorithms for solving complex machine learning problems.

Key Features

  • Discover high-performing machine learning algorithms and understand how they work in depth
  • One-stop solution to mastering supervised, unsupervised, and...
Integrative Medicine for Vulnerable Populations: A Clinical Guide to Working with Chronic and Comorbid Medical Disease, Mental Illness, and Addiction
Integrative Medicine for Vulnerable Populations: A Clinical Guide to Working with Chronic and Comorbid Medical Disease, Mental Illness, and Addiction

This first-of-its-kind title addresses the failures of an often fragmented healthcare system in managing vulnerable patients with multiple, chronic, co-morbid conditions -- patients who are frequently unresponsive to the methods and approaches used to treat other patients with conditions that are less complicated. The book...

Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...

XSLT Programmer's Reference
XSLT Programmer's Reference
As XML begins to take hold, the eXtensible Stylesheet Language: Transformation (XSLT) standard will be playing a major role in making all those XML predictions a reality. Author Michael Kay exudes enthusiasm in this guide, XSLT Programmer's Reference, by taking every opportunity to illustrate the power and flexibility of XSLT.

Kay...

Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Changing Software Development: Learning to Become Agile
Changing Software Development: Learning to Become Agile

“Successful companies have known the importance of continuous change and learning for a long time; this is the first book that describes these concepts in an organic way in the context of software development. A must read for everybody involved in this business.”

Giovanni Asproni, Director, Asprotunity...

Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
Coaching at Work: Powering your Team with Awareness, Responsibility and Trust
Coaching at Work: Powering your Team with Awareness, Responsibility and Trust

"This book comes at a time when we are asking searching questions: How exactly do we earn the loyalty, trust and commitment of our people? How do we balance the needs of our organisations to do more with less with the need to create environments in which people can grow, develop and achieve their aspirations? The answers lie within each...

unlimited object storage image
Result Page: 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy