Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server
Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server
Learn Docker "infrastructure as code" technology to define a system for performing standard but non-trivial data tasks on medium- to large-scale data sets, using Jupyter as the master controller.

It is not uncommon for a real-world data set to fail to be easily managed. The set may not fit well into access memory or
...
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code

Inject dependencies and write highly maintainable and flexible code using the new .NET Core DI Engine

About This Book

  • Identify when to use the constructors, parameters, setters, or Interface Injection, for best results
  • Build dependencies not only for MVC within .NET but also for other...
Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
You Belong to Me: A Novel
You Belong to Me: A Novel

Nine years after his last critically acclaimed thriller, The Finder, Colin Harrison returns with You Belong to Me. Filled with compelling characters and a loving but biting satire of New York City, You Belong to Me is an exceptional novel, and Colin Harrison is at the top of his game.

...

Copyright Law in the Digital World: Challenges and Opportunities
Copyright Law in the Digital World: Challenges and Opportunities

This book addresses the key issues, challenges and implications arising out of changes in the copyright law and corresponding judicial responses. Using concrete examples, the book does not assume any prior knowledge of copyright law, but brings together leading intellectual property researchers to consider the significant role of copyright...

CompTIA Project+ Practice Tests: Exam PK0-004
CompTIA Project+ Practice Tests: Exam PK0-004

Over 1,000 practice exam questions with full explanations

CompTIA Project+ Practice Tests for exam PK0-004 compliments the Sybex CompTIA Project+ Study Guide by providing last minute review and identifying areas where further review may be needed. 1,000 unique questions are organized into 4 practice tests that cover...

DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Reinforcement Learning: With Open AI, TensorFlow and Keras Using Python
Reinforcement Learning: With Open AI, TensorFlow and Keras Using Python
Master reinforcement learning, a popular area of machine learning, starting with the basics: discover how agents and the environment evolve and then gain a clear picture of how they are inter-related. You’ll then work with theories related to reinforcement learning and see the concepts that build up the reinforcement...
Read & Think Spanish, Premium Third Edition
Read & Think Spanish, Premium Third Edition

Your first-class ticket to building key Spanish language skills

From the bestselling Read & Think series, this fully-illustrated third edition of Read & Think Spanish brings the Spanish language to life! In addition to introducing, developing, and growing key vocabulary, this book gives you an insider’s look at the...

100 Midcentury Chairs: And Their Stories
100 Midcentury Chairs: And Their Stories

Pull up a chair (or 100) for this midcentury design showcase.

Here is a stylish guide to the top 100 most interesting, most controversial, or simply most beautiful chairs designed between 1930 and 1970. Get to know the designers of the Modern era, including the Eames, Jacobsen, Nakashima, Noguchi, Wegner, and many more,...

unlimited object storage image
Result Page: Previous 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy