Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python

Explore effective trading strategies in real-world markets using NumPy, spaCy, pandas, scikit-learn, and Keras

Key Features

  • Implement machine learning algorithms to build, train, and validate algorithmic models
  • Create your own algorithmic design process to apply...
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Beginning Database Design: From Novice to Professional (Beginning Apress)
Beginning Database Design: From Novice to Professional (Beginning Apress)
Everyone keeps data. Big organizations spend millions to look after their payroll, customer, and transaction data. The penalties for getting it wrong are severe: businesses may collapse, shareholders and customers lose money, and for many organizations (airlines, health boards, energy companies), it is not exaggerating to say that...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business intelligence and data warehousing projects can be challenging and complex. Dealing with new technologies, processes, and different stakeholders presents an array of potential problems. To aid the project manager, there are recipes about project definition, scope, control, and risk management. Requirements, design, data analysis,...
Microfluidics for Biotechnology (Microelectromechanical Systems)
Microfluidics for Biotechnology (Microelectromechanical Systems)
Since the concept of the first DNA biochip, biotechnologies have soared, deeply changing the world of biology. In fact, they have already had direct implications on each of us. Since the very beginning of this science in the 1980s, spectacular advances have been made, such as the analysis of the human DNA genome sequence, while...
Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
The celebration welcoming the second half of the 21st century on 31 December 2050 was subdued in the Persian Gulf. The major cities of Saudi Arabia, Kuwait, and others were dark. No fireworks or other signs of jubilation. Even those among them who had diversified their economies by investing in tourism, technology parks,...
Failed Stone
Failed Stone
In the spring of 2002, I wrote a book entitled Falling Glass: Problems and Solutions in Contemporary Architecture. The research for Falling Glass helped me understand how glass failures could be avoided and enlightened me as to which innovations were being explored within the glass industry. Originally, the book was...
Business Intelligence and Agile Methodologies for Knowledge-Based Organizations: Cross-Disciplinary Applications
Business Intelligence and Agile Methodologies for Knowledge-Based Organizations: Cross-Disciplinary Applications
Business intelligence is made possible by the existence of Information Technology. Business intelligence aims to support better business decision-making. To use agile methodologies and to develop Information Technology faster and cheaper is to put an icing on the cake. I doubt that Hans Peter Luhn was aware of the consequences of...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Testing of Genetically Modified Organisms in Foods
Testing of Genetically Modified Organisms in Foods

Examine several methods of testing for genetically modified organisms and the reasons behind their strict regulation!

Testing of Genetically Modified Organisms in Foods is the first study of the screening methods and tools utilized for determining the presence of genetically modified organisms (GMOs) in food products. Leading
...

Result Page: 99 98 97 96 95 94 93 92 91 90 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy