Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Ensemble Learning with R: A beginner's guide to combining the power of machine learning algorithms using ensemble techniques
Hands-On Ensemble Learning with R: A beginner's guide to combining the power of machine learning algorithms using ensemble techniques

Explore powerful R packages to create predictive models using ensemble methods

Key Features

  • Implement machine learning algorithms to build ensemble-efficient models
  • Explore powerful R packages to create predictive models using ensemble methods
  • Learn to...
Raspberry Pi for Arduino Users: Building IoT and Network Applications and Devices
Raspberry Pi for Arduino Users: Building IoT and Network Applications and Devices
Leverage your Arduino skills in the Raspberry Pi world and see how to cross the two platforms into sophisticated programs.

The Arduino and Raspberry Pi communities overlap more than you might think. Arduinos can be expanded to have network capabilities with a variety of “shields,” all of which increase
...
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120
Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120

Your Guide to CCENT and CCNA IOS Commands

This book is an ideal supplement to Todd Lammle’s CCENT and CCNA Study Guides, and a great quick reference for any Cisco networking administrator. Covering IOS version 15, each chapter begins with a short introduction, explaining what tasks will be discussed, followed by...

802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Oracle Database 12c Backup and Recovery Survival Guide
Oracle Database 12c Backup and Recovery Survival Guide

A comprehensive guide for every DBA to learn recovery and backup solutions

Overview

  • A practical reference to all Oracle backup and recovery options available, making it essential to any DBA in the world
  • A valuable guide for readers on the most frequent backup and recovery scenarios they can...
Learning scikit-learn: Machine Learning in Python
Learning scikit-learn: Machine Learning in Python

Incorporating machine learning in your applications is becoming essential. As a programmer this book is the ideal introduction to scikit-learn for your Python environment, taking your skills to a whole new level.

Overview

  • Use Python and scikit-learn to create intelligent applications
  • Apply...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Oracle Database 11g Underground Advice for Database Administrators
Oracle Database 11g Underground Advice for Database Administrators

Today DBAs are expected to deploy and manage large databases with quality service and little to no downtime. The DBA's main focus is on increasing productivity and eliminating idle redundancy throughout the enterprise. However, there is no magic set of best practices or hard and fast rules that DBAs need to follow, and this can make life...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Pale Blue Dot: A Vision of the Human Future in Space
Pale Blue Dot: A Vision of the Human Future in Space

"FASCINATING . . . MEMORABLE . . . REVEALING . . . PERHAPS THE BEST OF CARL SAGAN'S BOOKS."
--The Washington Post Book World (front page review)

In Cosmos, the late astronomer Carl Sagan cast his gaze over the magnificent mystery of the Universe and made it accessible to millions of people around the
...

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy