Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Designing Machine Learning Systems with Python
Designing Machine Learning Systems with Python

Design efficient machine learning systems that give you more accurate results

About This Book

  • Gain an understanding of the machine learning design process
  • Optimize machine learning systems for improved accuracy
  • Understand common programming tools and techniques for machine...
Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.

If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...

151 Quick Ideas to Manage Your Time
151 Quick Ideas to Manage Your Time

Too many of us live our lives trying to shoehorn our many activities and responsibilities into too few time slots available. Increasingly for business people, fathers and mothers, even kids—(ineffectively) managing the myriad of activities has become an all-consuming chore. And we're so stressed that our relationships and job...

Nginx 1 Web Server Implementation Cookbook
Nginx 1 Web Server Implementation Cookbook

Nginx is an open source high-performance web server, which has gained quite some popularity recently. Due to its modular architecture and small footprint, it has been the default choice for a lot of smaller Web 2.0 companies to be used as a load-balancing proxy server. It supports most of the existing backend web protocols such as FCGI,...

Practical Data Analysis
Practical Data Analysis

Transform, model, and visualize your data through hands-on projects, developed in open source tools

Overview

  • Explore how to analyze your data in various innovative ways and turn them into insight
  • Learn to use the D3.js visualization tool for exploratory data analysis
  • ...
Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Practical Ruby Gems
Practical Ruby Gems
Practical Ruby Gems is a comprehensive guide to utilizing and creating Ruby Gems--ready-made Ruby code modules that can be easily added to Ruby and Rails projects. This book is ideal for Ruby programmers as well as web developers who use Rails and wish to extend the functionality of their projects.

You'll get a prime selection of 34 of
...
Degunking Microsoft Office
Degunking Microsoft Office
Degunking Microsoft Office covers the basics to help you quickly get your PCs back to top performance. The unique thing about Degunking Microsoft Office is that it's organized according to the special "cleaning" process that will improve the performance of your computer. Shortcut and time calculation charts are provided...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy