Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Designing Machine Learning Systems with Python
Designing Machine Learning Systems with Python

Design efficient machine learning systems that give you more accurate results

About This Book

  • Gain an understanding of the machine learning design process
  • Optimize machine learning systems for improved accuracy
  • Understand common programming tools and techniques for machine...
DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Practical Data Analysis
Practical Data Analysis

Transform, model, and visualize your data through hands-on projects, developed in open source tools

Overview

  • Explore how to analyze your data in various innovative ways and turn them into insight
  • Learn to use the D3.js visualization tool for exploratory data analysis
  • ...
Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

The Internet: The Missing Manual
The Internet: The Missing Manual

The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?

This utterly current book...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

The Book of Postfix: State-of-the-Art Message Transport
The Book of Postfix: State-of-the-Art Message Transport
Sendmail is the "King of the Hill" of the open source mail transport world, but Postfix is gaining steam. Wietse Venema, creator of TCP Wrapper and co-developer of TCT (The Coroner's Toolkit), wrote Postfix to create a faster and more secure mail transport application.

Setting up and maintaining any email server application is no walk...

SEO 2017 Learn Search Engine Optimization With Smart Internet Marketing Strateg: Learn SEO with smart internet marketing strategies
SEO 2017 Learn Search Engine Optimization With Smart Internet Marketing Strateg: Learn SEO with smart internet marketing strategies

Most of the search engine optimization advice on the Internet is wrong!

If you've sifted through the torrents of search engine optimization advice online, you may have noticed two things:

- Most published SEO advice is either outdated or just dead-wrong.
- Google's constant updates have made many
...

Building a Monitoring Infrastructure with Nagios
Building a Monitoring Infrastructure with Nagios
Build real-world, end-to-end network monitoring solutions with Nagios

 

This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David...

Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.

If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy