Archer S09E08 Danger Island: A Discovery | Tomb Raider | Free movies online
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Practical Data Analysis
Practical Data Analysis

Transform, model, and visualize your data through hands-on projects, developed in open source tools

Overview

  • Explore how to analyze your data in various innovative ways and turn them into insight
  • Learn to use the D3.js visualization tool for exploratory data analysis
  • ...
151 Quick Ideas to Manage Your Time
151 Quick Ideas to Manage Your Time

Too many of us live our lives trying to shoehorn our many activities and responsibilities into too few time slots available. Increasingly for business people, fathers and mothers, even kids—(ineffectively) managing the myriad of activities has become an all-consuming chore. And we're so stressed that our relationships and job...

Practical Ruby Gems
Practical Ruby Gems
Practical Ruby Gems is a comprehensive guide to utilizing and creating Ruby Gems--ready-made Ruby code modules that can be easily added to Ruby and Rails projects. This book is ideal for Ruby programmers as well as web developers who use Rails and wish to extend the functionality of their projects.

You'll get a prime selection of 34 of
...
Doing Data Science: Straight Talk from the Frontline
Doing Data Science: Straight Talk from the Frontline

Now that people are aware that data can make the difference in an election or a business model, data science as an occupation is gaining ground. But how can you get started working in a wide-ranging, interdisciplinary field that’s so clouded in hype? This insightful book, based on Columbia University’s Introduction to...

Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read...

WordPress For Dummies  (Computer/Tech)
WordPress For Dummies (Computer/Tech)
Bloggers love WordPress! If you're ready to start using this free blogging software, WordPress For Dummies, 2nd Edition is just what you and your blog need to make a splash.

Professional blog designer Lisa Sabin-Wilson shows you how to use all the latest upgrades to WordPress and helps you decide whether to use the Wordpress.com hosted...

Automating System Administration with Perl: Tools to Make You More Efficient
Automating System Administration with Perl: Tools to Make You More Efficient

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely...

Java 9 Programming Blueprints
Java 9 Programming Blueprints

Key Features

  • See some of the new features of Java 9 and be introduced to parts of the Java SDK
  • This book provides a set of diverse, interesting projects that range in complexity from fairly simple to advanced and cover HTTP 2.0
  • Take advantage of Java's new modularity features to write...
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.

If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...

Designing Machine Learning Systems with Python
Designing Machine Learning Systems with Python

Design efficient machine learning systems that give you more accurate results

About This Book

  • Gain an understanding of the machine learning design process
  • Optimize machine learning systems for improved accuracy
  • Understand common programming tools and techniques for machine...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy