Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reinforcement Learning: With Open AI, TensorFlow and Keras Using Python
Reinforcement Learning: With Open AI, TensorFlow and Keras Using Python
Master reinforcement learning, a popular area of machine learning, starting with the basics: discover how agents and the environment evolve and then gain a clear picture of how they are inter-related. You’ll then work with theories related to reinforcement learning and see the concepts that build up the reinforcement...
Make Your Own Python Text Adventure: A Guide to Learning Programming
Make Your Own Python Text Adventure: A Guide to Learning Programming

Learn programming with Python by creating a text adventure. This book will teach you the fundamentals of programming, how to organize code, and some coding best practices. By the end of the book, you will have a working game that you can play or show off to friends. You will also be able to change the game and make it your...

Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Discover hidden relationships among the variables in your data, and learn how to exploit these relationships.  This book presents a collection of data-mining algorithms that are effective in a wide variety of prediction and classification applications.  All algorithms include an intuitive explanation of operation, essential...
Java 9 for Programmers (4th Edition) (Deitel Developer Series)
Java 9 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to Java® 9 and the powerful Java platform

 

Written for programmers with a background in another high-level language, this book applies the...

DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation
DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation
A book like this has been a long time coming. Being a DBA is not an easy calling – especially in today’s world. There was a time when DBAs were prized keepers of data within organizations. What we did was a mystery to most, but the role was somewhat predictable. With the introduction of IaaS, PaaS, SaaS, machine...
Neural Network Programming with TensorFlow: Unleash the power of TensorFlow to train efficient neural networks
Neural Network Programming with TensorFlow: Unleash the power of TensorFlow to train efficient neural networks

Neural Networks and their implementation decoded with TensorFlow

About This Book

  • Develop a strong background in neural network programming from scratch, using the popular Tensorflow library.
  • Use Tensorflow to implement different kinds of neural networks – from simple...
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts

Transform yourself into a specialist in DevOps adoption for Big Data on cloud

Key Features

  • Learn the concepts of Bigdata and Devops and Implement them
  • Get Acquainted with DevOps Frameworks Methodologies and Tools
  • A practical approach to build and work efficiently with your...
Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Learn Salesforce Lightning: The Visual Guide to the Lightning UI
Learn Salesforce Lightning: The Visual Guide to the Lightning UI

Refer to this invaluable how-to guide for basic training on Salesforce Lightning. Salespeople and technical users and consultants will no longer have to resort to learning the interface on their own, which is very time consuming.

Learn Salesforce Lightning is a step-by-step visual guide that offers immediate and...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy