Master reinforcement learning, a popular area of machine learning, starting with the basics: discover how agents and the environment evolve and then gain a clear picture of how they are inter-related. You’ll then work with theories related to reinforcement learning and see the concepts that build up the reinforcement...
Learn programming with Python by creating a text adventure. This book will teach you the fundamentals of programming, how to organize code, and some coding best practices. By the end of the book, you will have a working game that you can play or show off to friends. You will also be able to change the game and make it your...
Discover hidden relationships among the variables in your data, and learn how to exploit these relationships. This book presents a collection of data-mining algorithms that are effective in a wide variety of prediction and classification applications. All algorithms include an intuitive explanation of operation, essential...
A book like this has been a long time coming. Being a DBA is not an easy
calling – especially in today’s world. There was a time when DBAs were
prized keepers of data within organizations. What we did was a mystery
to most, but the role was somewhat predictable. With the introduction of
IaaS, PaaS, SaaS, machine...
Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...
Refer to this invaluable how-to guide for basic training on Salesforce Lightning. Salespeople and technical users and consultants will no longer have to resort to learning the interface on their own, which is very time consuming.
Learn Salesforce Lightning is a step-by-step visual guide that offers immediate and...
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...