Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning R Programming
Learning R Programming

Key Features

  • Explore the R language from basic types and data structures to advanced topics
  • Learn how to tackle programming problems and explore both functional and object-oriented programming techniques
  • Learn how to address the core problems of programming in R and leverage the most popular...
Deploying Raspberry Pi in the Classroom
Deploying Raspberry Pi in the Classroom

Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to navigate the hardware and software choices you face.

Deploying Raspberry Pi in the Classroom equips you with the skills and knowledge to plan and execute a deployment of Raspberry Pi computers in the classroom.  Teachers and IT...

The Official (ISC)2 Guide to the CCSP CBK
The Official (ISC)2 Guide to the CCSP CBK

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert...

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

...

ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

R Deep Learning Essentials
R Deep Learning Essentials

Key Features

  • Harness the ability to build algorithms for unsupervised data using deep learning concepts with R
  • Master the common problems faced such as overfitting of data, anomalous datasets, image recognition, and performance tuning while building the models
  • Build models relating to neural...
The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices
The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices

This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...

Managing Mission-Critical Domains and DNS
Managing Mission-Critical Domains and DNS

Manage your organization’s naming architecture effectively, from the administrative/policy side right through to the technical DNS and nameserver implementations. This practical book takes you through the basics—the anatomies of domain names and DNS requests—and covers DNS and domain issues from a variety of...

Kafka: The Definitive Guide: Real-time data and stream processing at scale
Kafka: The Definitive Guide: Real-time data and stream processing at scale

Learn how to take full advantage of Apache Kafka, the distributed, publish-subscribe queue for handling real-time data feeds. With this comprehensive book, you’ll understand how Kafka works and how it’s designed. Authors Neha Narkhede, Gwen Shapira, and Todd Palino show you how to deploy production Kafka clusters; secure,...

Extending Docker
Extending Docker

Key Features

  • Get the first book on the market that shows you how to extend the capabilities of Docker using plugins and third-party tools
  • Master the skills of creating various plugins and integrating great tools in order to enhance the functionalities of Docker
  • A practical and learning guide...
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Learning Analytics in R with SNA, LSA, and MPIA
Learning Analytics in R with SNA, LSA, and MPIA

This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.    

...

Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy