To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract...
Need a quick and easy to understand introduction to MongoDB and NoSQL databases? MongoDB Basics, from The Definitive Guide to MongoDB, 2E, shows you how a document-oriented database system differs from a relational database, and how to install and get started using it. You'll also learn MongoDB design basics, including...
The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...
This guide is an ideal learning tool and reference for Apache Pig, the open source engine for executing parallel data flows on Hadoop. With Pig, you can batch-process data without having to create a full-fledged application—making it easy for you to experiment with new datasets.
This first-of-its-kind title addresses the failures of an often fragmented healthcare system in managing vulnerable patients with multiple, chronic, co-morbid conditions -- patients who are frequently unresponsive to the methods and approaches used to treat other patients with conditions that are less complicated. The book...
This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...
As XML begins to take hold, the eXtensible Stylesheet Language: Transformation (XSLT) standard will be playing a major role in making all those XML predictions a reality. Author Michael Kay exudes enthusiasm in this guide, XSLT Programmer's Reference, by taking every opportunity to illustrate the power and flexibility of XSLT.
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
“Successful companies have known the importance of continuous change and learning for a long time; this is the first book that describes these concepts in an organic way in the context of software development. A must read for everybody involved in this business.”
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
"This book comes at a time when we are asking searching questions: How exactly do we earn the loyalty, trust and commitment of our people? How do we balance the needs of our organisations to do more with less with the need to create environments in which people can grow, develop and achieve their aspirations? The answers lie within each...