Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science
Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science

Key Features

  • This book contains recipes on how to use Apache Spark as a unified compute engine
  • Cover how to connect various source systems to Apache Spark
  • Covers various parts of machine learning including supervised/unsupervised learning & recommendation engines

Book...

The Savage: A Novel
The Savage: A Novel

In the raucous and action-packed follow-up to Donnybrook, mayhem is still the order of the day―only more so

The dollar has failed; the grid is wiped out. Walmarts are looted and homes are abandoned as common folk flee and bloodthirsty militias fight for power. In a twenty-first century America gone haywire,...

Test Driven Development in Ruby: A Practical Introduction to TDD Using Problem and Solution Domain Analysis
Test Driven Development in Ruby: A Practical Introduction to TDD Using Problem and Solution Domain Analysis
Learn the basics of test driven development (TDD) using Ruby. You will carry out problem domain analysis, solution domain analysis, designing test cases, and writing tests first. These fundamental concepts will give you a solid TDD foundation to build upon. Test Driven Development in Ruby is written by a developer for...
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code

Inject dependencies and write highly maintainable and flexible code using the new .NET Core DI Engine

About This Book

  • Identify when to use the constructors, parameters, setters, or Interface Injection, for best results
  • Build dependencies not only for MVC within .NET but also for other...
Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
You Belong to Me: A Novel
You Belong to Me: A Novel

Nine years after his last critically acclaimed thriller, The Finder, Colin Harrison returns with You Belong to Me. Filled with compelling characters and a loving but biting satire of New York City, You Belong to Me is an exceptional novel, and Colin Harrison is at the top of his game.

...

Processing Big Data with Azure HDInsight: Building Real-World Big Data Systems on Azure HDInsight Using the Hadoop Ecosystem
Processing Big Data with Azure HDInsight: Building Real-World Big Data Systems on Azure HDInsight Using the Hadoop Ecosystem
Get a jump start on using Azure HDInsight and Hadoop Ecosystem components. As most Hadoop and Big Data projects are written in either Java, Scala, or Python, this book minimizes the effort to learn another language and is written from the perspective of a .NET developer. Hadoop components are covered, including Hive, Pig, HBase, Storm,...
The Vietnam War: The Definitive Illustrated History
The Vietnam War: The Definitive Illustrated History

Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.

Honoring those who served in the war at home or abroad,...

Why Stock Markets Crash: Critical Events in Complex Financial Systems (Princeton Science Library)
Why Stock Markets Crash: Critical Events in Complex Financial Systems (Princeton Science Library)

The scientific study of complex systems has transformed a wide range of disciplines in recent years, enabling researchers in both the natural and social sciences to model and predict phenomena as diverse as earthquakes, global warming, demographic patterns, financial crises, and the failure of materials. In this book, Didier Sornette boldly...

Java 9 Modularity Revealed: Project Jigsaw and Scalable Java Applications
Java 9 Modularity Revealed: Project Jigsaw and Scalable Java Applications

Develop modular applications using the Java Platform Module System, the single most anticipated feature in Java 9. You will improve maintainability and performance of your Java applications by deploying only modules that are needed and encapsulating their implementation details. 


Until now Java has been monolithic.
...
Result Page: Previous 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy