Kevin (Probably) Saves the World | 13.Reasons.Why.S01E04.MULTi.1080p.WEB.x264-CiELOS | Комедия
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Embrace machine learning approaches and Python to enable automatic rendering of rich insights and solve business problems. The book uses a hands-on case study-based approach to crack real-world applications to which machine learning concepts can be applied. These smarter machines will enable your business processes to achieve efficiencies on...
Building Machine Learning Systems with Python
Building Machine Learning Systems with Python

As the Big Data explosion continues at an almost incomprehensible rate, being able to understand and process it becomes even more challenging. With Building Machine Learning Systems with Python, you'll learn everything you need to tackle the modern data deluge - by harnessing the unique capabilities of Python and its extensive range of...

Getting Started with Kubernetes - Second Edition
Getting Started with Kubernetes - Second Edition

Learn how to schedule and run application containers using Kubernetes.

About This Book

  • Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
  • Confidently manage your container clusters and networks using Kubernetes
  • This practical...
The Big Book of NLP, Expanded: 350+ Techniques, Patterns & Strategies of Neuro Linguistic Programming
The Big Book of NLP, Expanded: 350+ Techniques, Patterns & Strategies of Neuro Linguistic Programming
"A short NLP seminar will cost you at least $4,500. In this book you invest less than $0.25 per NLP technique, that can literally change your life. That's a bargain!" --Thomas Landmark, Revolucni NLP

828 pages of practical NLP.

At...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Xamarin Cross-platform Application Development - Second Edition
Xamarin Cross-platform Application Development - Second Edition

Develop production-ready applications for iOS and Android using Xamarin

About This Book

  • Write native iOS and Android applications with Xamarin.iOS and Xamarin.Android respectively
  • Learn strategies that allow you to share code between iOS and Android
  • Design user interfaces...
CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
Parallel and Distributed Map Merging and Localization: Algorithms, Tools and Strategies for Robotic Networks (SpringerBriefs in Computer Science)
Parallel and Distributed Map Merging and Localization: Algorithms, Tools and Strategies for Robotic Networks (SpringerBriefs in Computer Science)

This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinated tasks. After identifying the main issues associated with this problem, each chapter introduces a different distributed strategy for solving...

VMware Horizon 6 Desktop Virtualization Solutions
VMware Horizon 6 Desktop Virtualization Solutions

Plan, design, and secure your virtual desktop environments with VMware Horizon 6 View

About This Book

  • Design a successful solution to deliver Windows desktops and applications as a service
  • Provide redundancy for components and design a backup solution and disaster recovery plan to protect...
Git in Practice
Git in Practice

Summary

Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

CryENGINE 3 Game Development: Beginner's Guide
CryENGINE 3 Game Development: Beginner's Guide

Discover how to use the CryENGINE 3 free SDK, the next-generation, real-time game development tool

  • Begin developing your own games of any scale by learning to harness the power of the Award Winning CryENGINE® 3 game engine
  • Build your game worlds in real-time with CryENGINE® 3 Sandbox as we share...
Result Page: 183 182 181 180 179 178 177 176 175 174 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy