Adaalat 3 (Bengali) Episode 203 204 – Hatyakari Dainy Part 2 HD | Hemlock Grove | Jugglers
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning with Python: A Hands-on Introduction
Deep Learning with Python: A Hands-on Introduction
Discover the practical aspects of implementing deep-learning solutions using the rich Python ecosystem. This book bridges the gap between the academic state-of-the-art and the industry state-of-the-practice by introducing you to deep learning frameworks such as Keras, Theano, and Caffe. The practicalities of these frameworks is often...
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional...

Java Persistence with Hibernate
Java Persistence with Hibernate

Summary

Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR...

Python GUI Programming Cookbook
Python GUI Programming Cookbook

Over 80 object-oriented recipes to help you create mind-blowing GUIs in Python

About This Book

  • Use object-oriented programming to develop amazing GUIs in Python
  • Create a working GUI project as a central resource for developing your Python GUIs
  • Packed with easy-to-follow...
Microservices: Building Scalable Software
Microservices: Building Scalable Software

With the introduction of the cloud, enterprise application development moved from monolithic applications to small, lightweight, and process-driven components called microservices.

Microservices architecture is a style of software architecture, which makes application development easier and offers great flexibility to utilize
...

Data Analysis with R
Data Analysis with R

Key Features

  • Load, manipulate and analyze data from different sources
  • Gain a deeper understanding of fundamentals of applied statistics
  • A practical guide to performing data analysis in practice

Book Description

Frequently the tool of choice for academics, R...

Secrets of Zbrush Experts: Tips, Techniques, and Insights for Users of All Abilities
Secrets of Zbrush Experts: Tips, Techniques, and Insights for Users of All Abilities

Step into the creative minds of some of today's best ZBrush artists! ZBrush is the digital sculpting and painting program used for animation, film, video, and computer games that has revolutionized the 3D industry. The artists featured in this book use ZBrush to create 3D models for some of the most prestigious studios in the industry...

Pro Spark Streaming: The Zen of Real-Time Analytics Using Apache Spark
Pro Spark Streaming: The Zen of Real-Time Analytics Using Apache Spark

Learn the right cutting-edge skills and knowledge to leverage Spark Streaming to implement a wide array of real-time, streaming applications. This book walks you through end-to-end real-time application development using real-world applications, data, and code. Taking an application-first approach, each chapter introduces use cases from...

CentOS System Administration Essentials
CentOS System Administration Essentials

Become an efficient CentOS administrator by acquiring real-world knowledge of system setup and configuration

About This Book

  • Centralize user accounts in openLDAP and understand how Directory can be at the back-end of many services
  • Learning Puppet to centralize server configuration will...
Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

gnuplot Cookbook
gnuplot Cookbook
gnuplot is a free, open source plotting program that has been in wide use since 1986. It's used as the graphics backend by many other programs, so plenty of people use gnuplot without knowing it. If you've used Octave, Maxima, statist, gretl, or the Emacs graphing calculator, you've already used gnuplot.

...
Memory Management: International Workshop IWMM 92, St.Malo, France, September 17 - 19, 1992. Proceedings
Memory Management: International Workshop IWMM 92, St.Malo, France, September 17 - 19, 1992. Proceedings
This is the first book entirely dedicated to the problem of memory management in programming language implementation. Its originality stems from the diversity of languages and approaches presented: functional programming, logic programming, object oriented programming, and parallel and sequential programming. The book...
Result Page: 75 74 73 72 71 70 69 68 67 66 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy