Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning in Java: Helpful techniques to design, build, and deploy powerful machine learning applications in Java, 2nd Edition
Machine Learning in Java: Helpful techniques to design, build, and deploy powerful machine learning applications in Java, 2nd Edition

Leverage the power of Java and its associated machine learning libraries to build powerful predictive models

Key Features

  • Solve predictive modeling problems using the most popular machine learning Java libraries
  • Explore data processing, machine learning, and NLP concepts...
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...

TypeScript Revealed
TypeScript Revealed

TypeScript Revealed is a quick 100-page guide to Anders Hejlsberg's new take on JavaScript. With this brief, fast-paced introduction to TypeScript, .NET, Web and Windows 8 application developers who are already familiar with JavaScript will easily get up to speed with TypeScript and decide whether or not to start incorporating it...

Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

Docker Orchestration
Docker Orchestration

Key Features

  • Explore the new features added to the core Docker Engine to make multi-container orchestration easy
  • Leverage tools such as Docker Machine, Swarm, Compose, and third-party tools such as Kubernetes, Mesosphere, and CoreOS to orchestrate containers
  • Use Docker Compose with Swarm and...
Essentials of Knowledge Management
Essentials of Knowledge Management
"Managing knowledge has become a critical competency for organizations. Despite its importance, knowledge management is often seen as a complex, diffuse, and difficult-to-understand management practice. In his new book, Essentials of Knowledge Management, Bryan Bergeron continues to display his remarkable ability to thoughtfully,...
Kubernetes Microservices with Docker
Kubernetes Microservices with Docker

Start using Kubernetes in complex big data and enterprise applications, including Docker containers. Starting with installing Kubernetes on a single node, the book introduces Kubernetes with a simple Hello example and discusses using environment variables in Kubernetes. 
 

Next, Kubernetes Microservices with...
Domain-Driven Design Using Naked Objects
Domain-Driven Design Using Naked Objects

Domain-driven design (DDD) focuses on what matters in enterprise applications: the core business domain. Using object-oriented principles, you can develop a domain model that all team members-including business experts and technical specialists-can understand. Even better, this model is directly related to the underlying...

Exploring C++ 11 (Expert's Voice in C++)
Exploring C++ 11 (Expert's Voice in C++)

Exploring C++ divides C++ up into bite-sized chunks that will help you learn the language one step at a time. Assuming no familiarity with C++, or any other C-based language, you’ll be taught everything you need to know in a logical progression of small lessons that you can work through as quickly or as slowly as you need.

...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
One Giant Leap: The Impossible Mission That Flew Us to the Moon
One Giant Leap: The Impossible Mission That Flew Us to the Moon
The remarkable story of the trailblazers and the ordinary Americans on the front lines of the epic mission to reach the moon.

President John F. Kennedy astonished the world on May 25, 1961, when he announced to Congress that the United States should land a man on the Moon by 1970. No group was more surprised than the
...
Result Page: 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy