Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Bridge the gap between a high-level understanding of how an algorithm works and knowing the nuts and bolts to tune your models better. This book will give you the confidence and skills when developing all the major machine learning models. In Pro Machine Learning Algorithms, you will first develop the algorithm in Excel so...
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services

Key Features

  • Install and configure the components of ArcGIS Enterprise to meet your organization's requirements
  • Administer all aspects of ArcGIS Enterprise through user interfaces and APIs
  • Optimize and Secure ArcGIS Enterprise to make it run efficiently and...
The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
What you should know about the Covid-19 vaccines from top experts in the field.

As the SARS-Cov2 virus emerged and spread globally in early 2020, unprecedented international efforts began to develop and test vaccines to control the devastating pandemic. This book focuses on the remarkable progress in developing
...
Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)
e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)

Could information and communication technology (ICT) become the transformative tool for a new style of global development? Could ICT promote knowledge-based, innovation-driven, and smart, adaptive, participatory development? As countries seek a way out of the present period of economic contraction, they are trying to weave ICT into their...

Deconstructing the Elements with 3ds Max, Third Edition: Create natural fire, earth, air and water without plug-ins
Deconstructing the Elements with 3ds Max, Third Edition: Create natural fire, earth, air and water without plug-ins

ALL NEW TUTORIALS IN THIS NEW 3RD EDITION provide a unique and rigorous approach to teaching 3d artists the art and techniques of creating CG environments with the latest version of 3ds Max (200,000+ users).

3ds Max is the leading 3D modeling, animation, and rendering solution for artists, schools, and production
...

Secrets of the Oracle Database (Expert's Voice in Oracle)
Secrets of the Oracle Database (Expert's Voice in Oracle)
Secrets of the Oracle Database is the definitive guide to undocumented and partially documented features of the Oracle database server. Covering useful but little–known features from Oracle9i Database through Oracle Database 11g, this book will improve your efficiency as an Oracle database administrator or...
Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Service- and Component-based Development: Using the Select Perspective and UML
Service- and Component-based Development: Using the Select Perspective and UML

Select Perspective, from Select Business Solutions, is a set of best practices for software development that has evolved over a decade into a world-class component-based development (CBD) process. It is a blend of approaches from several object-oriented methods, improved and adapted to meet the new demands of CBD and Web...

Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
With the introduction of new revisions to Microsoft products—for example, Windows, Exchange, and Communications Server—we have seen a trend toward “roles” within each product, as opposed to the various products being an all-in-one type of solution (as with Exchange 2007), or being additional features that work as a snap-in,...
unlimited object storage image
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy