Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning with R - Second Edition
Machine Learning with R - Second Edition

Key Features

  • Harness the power of R for statistical computing and data science
  • Explore, forecast, and classify data with R
  • Use R to apply common machine learning algorithms to real-world scenarios

Book Description

Machine learning, at its core, is concerned...

Managing Technology-Based Projects: Tools, Techniques, People and Business Processes
Managing Technology-Based Projects: Tools, Techniques, People and Business Processes

A GUIDE TO EFFECTIVE PROJECT MANAGEMENT IN TECHNOLOGY-BASED FIRMS Used effectively, project management can increase a firm s market share, product quality, and customer satisfaction. Though technology-based companies place themselves at a competitive disadvantage if they neglect this strategic tool, many overlook project management s benefits...

The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95
Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95

Welcome to OpenGL SuperBible! The first time I ever heard of OpenGL was at the 1992 Win32 Developers Conference in San Francisco. Windows NT 3.1 was in early beta (or late alpha) and many vendors were present, pledging their future support for this exciting new platform. Among them was a company called Silicon Graphics, Inc. (SGI)....

Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Enabling eBusiness - Integrating Technologies Architectures & Applications
Enabling eBusiness - Integrating Technologies Architectures & Applications
This book describes the technical architecture and components that can be integrated in order to provide a comprehensive and robust infrastructure on which to build successful e-Business. It is essential reading for technical and functional team leaders and strategists, who analyse the options, limitations and possibilities for new technology and...
FileMaker Pro 8 for Windows & Macintosh (Visual QuickStart Guide)
FileMaker Pro 8 for Windows & Macintosh (Visual QuickStart Guide)
Need to learn FileMaker Pro fast? Try a Visual QuickStart Guide!

If you've recently upgraded to FileMaker Pro 8, teach yourself this powerful database software the quick and easy way! Using pictures rather than lengthy explanations, this Visual QuickStart Guide
...
LINQ in Action
LINQ in Action
LINQ, Language INtegrated Query, is a new extension to the Visual Basic and C# programming languages designed to simplify data queries and database interaction. It addreses O/R mapping issues by making query operations like SQL statements part of the programming language. It also offers built-in support for querying in-memory collections like...
Interconnecting Smart Objects with IP: The Next Internet
Interconnecting Smart Objects with IP: The Next Internet

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. Interconnecting Smart Objects with IP is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless...

eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)
eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)

E-marketing impacts all aspects of marketing from strategy and planning through the marketing mix, marketing communications and buyer behaviour to marketing research. eMarketing eXcellence highlights the most significant opportunities, pitfalls and defines the new marketing approaches needed. It highlights best practice in applying digital...

XAML Developer Reference
XAML Developer Reference
XAML is ubiquitous today. Whether with Silverlight, WPF, WF, various XPS formats, or XML-based formats, XAML is being used in a whole lot of Microsoft platform- based technologies. Though based on XML, XAML is unlike most other markup languages, because it is strongly linked to CLR assemblies through its objects.
 
...
Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)

Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each...

unlimited object storage image
Result Page: 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy