Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies.

Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book...

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Advanced Deep Learning with Keras: Apply deep learning techniques, autoencoders, GANs, variational autoencoders, deep reinforcement learning, policy gradients, and more
Advanced Deep Learning with Keras: Apply deep learning techniques, autoencoders, GANs, variational autoencoders, deep reinforcement learning, policy gradients, and more

A comprehensive guide to advanced deep learning techniques, including autoencoders, GANs, VAEs, and deep reinforcement learning that drive today's most impressive AI results

Key Features

  • Explore the most advanced deep learning techniques that drive modern AI results
  • ...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow

Implement state-of-the-art deep reinforcement learning algorithms using Python and its powerful libraries

Key Features

  • Implement Q-learning and Markov models with Python and OpenAI
  • Explore the power of TensorFlow to build self-learning models
  • Eight AI...
Reinforcement Learning with TensorFlow: A beginner's guide to designing self-learning systems with TensorFlow and OpenAI Gym
Reinforcement Learning with TensorFlow: A beginner's guide to designing self-learning systems with TensorFlow and OpenAI Gym

Leverage the power of reinforcement learning techniques to develop self-learning systems using TensorFlow

Key Features

  • Explore reinforcement learning concepts and their implementation using TensorFlow
  • Discover different problem-solving methods for reinforcement...
Hands-On Reinforcement Learning with Python: Master reinforcement and deep reinforcement learning using OpenAI Gym and TensorFlow
Hands-On Reinforcement Learning with Python: Master reinforcement and deep reinforcement learning using OpenAI Gym and TensorFlow

A hands-on guide enriched with examples to master deep reinforcement learning algorithms with Python

Key Features

  • Enter the world of artificial intelligence using the power of Python
  • An example-rich guide to master various RL and DRL algorithms
  • Explore...
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

Explore and master the most important algorithms for solving complex machine learning problems.

Key Features

  • Discover high-performing machine learning algorithms and understand how they work in depth
  • One-stop solution to mastering supervised, unsupervised, and...
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016
Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016

Equip yourself with the most complete and comprehensive preparation experience for Identity with Windows Server 2016: Microsoft 70-742 exam.

Key Features

  • Helps you demonstrate real-world mastery of Windows Server 2016 identity features and functionality and prepare for 70-742
  • ...
Deep Reinforcement Learning Hands-On: Apply modern RL methods, with deep Q-networks, value iteration, policy gradients, TRPO, AlphaGo Zero and more
Deep Reinforcement Learning Hands-On: Apply modern RL methods, with deep Q-networks, value iteration, policy gradients, TRPO, AlphaGo Zero and more

This practical guide will teach you how deep learning (DL) can be used to solve complex real-world problems.

Key Features

  • Explore deep reinforcement learning (RL), from the first principles to the latest algorithms
  • Evaluate high-profile RL methods, including value...
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Result Page: 69 68 67 66 65 64 63 62 61 60 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy