|
|
Reinforcement and Systemic Machine Learning for Decision Making
Reinforcement and Systemic Machine Learning for Decision Making
There are always difficulties in making machines that learn from experience. Complete information is not always available—or it becomes available in bits and pieces over a period of time. With respect to systemic learning, there is a need to understand the... | | Liferay in Action: The Official Guide to Liferay Portal Development
Summary
Liferay in Action is a comprehensive and authoritative guide to building portals on the Liferay 6 platform. Fully supported and authorized by Liferay, this book guides you smoothly from your first exposure to Liferay through the crucial day-to-day tasks of building and maintaining an enterprise... | | Samsung Galaxy S5 For Dummies
Explore Samsung's next generation Galaxy smartphone
Do you want an easy-to-follow guide to everything your new Galaxy S5 smartphone can do? From the basics of texting and accessing the Internet to the most advanced features and new software apps, Samsung Galaxy S5 For Dummies makes the need for tech support... |
|
Python for Secret Agents - Second Edition
Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents
About This Book
-
Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
-
Use Python's standard...
| | Advanced Analytics with Spark: Patterns for Learning from Data at Scale
In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.
You’ll start with an... | | Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... |
|
|
How to Design and Write Web Pages Today (Writing Today)
This standards-based approach shows readers how to create accessible, usable, and sustainable websites.
• Screenshots of different Web design approaches, practices, and user experiencesâall based on work by the author
• A brief glossary of the most common terms
• A select,... | | Web Application Development with Yii 2 and PHP
Fast-track your web application development using the new generation Yii PHP framework
About This Book
-
Implement real-world web application features efficiently using the Yii development framework
-
Each chapter provides micro-examples that build upon each other to create the final...
| | Fedora Linux Servers with systemd: second edition
This book is designed as a server reference for Fedora Linux with systemd. This second edition covers Fedora Linux 23. Administration tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key networking and server tasks. Topics covered... |
|
Result Page: Previous 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 Next |