Home | Amazing | Today | Tags | Publishers | Years | Search 
Deep Reinforcement Learning Hands-On: Apply modern RL methods, with deep Q-networks, value iteration, policy gradients, TRPO, AlphaGo Zero and more
Deep Reinforcement Learning Hands-On: Apply modern RL methods, with deep Q-networks, value iteration, policy gradients, TRPO, AlphaGo Zero and more

This practical guide will teach you how deep learning (DL) can be used to solve complex real-world problems.

Key Features

  • Explore deep reinforcement learning (RL), from the first principles to the latest algorithms
  • Evaluate high-profile RL methods, including value...
Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

Social Media Marketing: An Hour a Day
Social Media Marketing: An Hour a Day

Pick one. Test-drive a few luxury sports cars. A Ferrari, a Lamborghini, a Maserati maybe? Or compare the top First Growth Bordeaux from 2005. Maybe an Haut-Brion, Latour and Mouton-Rothschild? Alternatively, go play in a social media application. Perhaps creating your profile on Facebook or blogging about your passions or sharing...

Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on,...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)
Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)

THE “CLOUD” IS ONE OF THE MOST tossed-around words these days in any IT conversation. But what does it mean? And what are the implications of the cloud for SharePoint? In fact, there are many implications for SharePoint with the cloud, ranging from extending existing solutions to use code or services that are deployed to the...

iPad at Work
iPad at Work

Great ideas and advice on using your iPad as a business tool!

More and more iPad users discover every day that the versatile, portable iPad has countless business uses. From small businesses to high-profile corporations, companies are integrating iPads into their systems and workplaces at a phenomenal rate.

...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

New Perspectives on Computer Concepts 2011: Comprehensive (June Parsons Author)
New Perspectives on Computer Concepts 2011: Comprehensive (June Parsons Author)

Gaining access to the interactive learning activities on this Online Companion is easy—all you need to do is create a user profile. This simple, one-time process establishes you as a user in the CoursePort authentication system. By utilizing the Online Companion, students and instructors can reinforce the concepts they’re...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy