Zufällige Episode | Mythica: A Quest For Heroes | South Korea
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning with Python: A Hands-on Introduction
Deep Learning with Python: A Hands-on Introduction
Discover the practical aspects of implementing deep-learning solutions using the rich Python ecosystem. This book bridges the gap between the academic state-of-the-art and the industry state-of-the-practice by introducing you to deep learning frameworks such as Keras, Theano, and Caffe. The practicalities of these frameworks is often...
Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Embrace machine learning approaches and Python to enable automatic rendering of rich insights and solve business problems. The book uses a hands-on case study-based approach to crack real-world applications to which machine learning concepts can be applied. These smarter machines will enable your business processes to achieve efficiencies on...
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

Pro Python Best Practices: Debugging, Testing and Maintenance
Pro Python Best Practices: Debugging, Testing and Maintenance

Learn software engineering and coding best practices to write Python code right and error free. In this book you’ll see how to properly debug, organize, test, and maintain your code, all of which leads to better, more efficient coding.

Software engineering is difficult. Programs of any substantial length are...

Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.

...
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understanding and experience of agile development. To help bridge the...

Pro RESTful APIs: Design, Build and Integrate with REST, JSON, XML and JAX-RS
Pro RESTful APIs: Design, Build and Integrate with REST, JSON, XML and JAX-RS

Discover the RESTful technologies, including REST, JSON, XML, JAX-RS web services, SOAP and more, for building today's microservices, big data applications, and web service applications.  This book is based on a course the Oracle-based author is teaching for UC Santa Cruz Silicon Valley which covers architecture, design best...

Getting Started with Kubernetes - Second Edition
Getting Started with Kubernetes - Second Edition

Learn how to schedule and run application containers using Kubernetes.

About This Book

  • Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
  • Confidently manage your container clusters and networks using Kubernetes
  • This practical...
Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise

Achieve streamlined, rapid production with enterprise-level DevOps

Awarded DevOps 2017 Book of the Year, The DevOps Adoption Playbook provides practical, actionable, real-world guidance on implementing DevOps at enterprise scale. Author Sanjeev Sharma heads the DevOps practice for IBM; in this book, he provides unique...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Business Intelligence Tools for Small Companies: A Guide to Free and Low-Cost Solutions
Business Intelligence Tools for Small Companies: A Guide to Free and Low-Cost Solutions

Learn how to transition from Excel-based business intelligence (BI) analysis to enterprise stacks of open-source BI tools. Select and implement the best free and freemium open-source BI tools for your company’s needs and design, implement, and integrate BI automation across the full stack using agile methodologies.

...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Next 
¬©2018 LearnIT (support@pdfchm.net) - Privacy Policy