Home | Amazing | Today | Tags | Publishers | Years | Search 
The Little Japanese Cookbook: More than 80 delicious recipes (The Little Cookbook)
The Little Japanese Cookbook: More than 80 delicious recipes (The Little Cookbook)
The Little Japanese Cookbook explores how geography, climate, culture, and tradition have shaped one of the world's most popular cuisines. Take a look behind-the-scenes at the world of growers, artisans, chefs, and home cooks whose passion for produce is reflected in the incredibly varied, regional styles and flavors of...
Neural Network Programming with TensorFlow: Unleash the power of TensorFlow to train efficient neural networks
Neural Network Programming with TensorFlow: Unleash the power of TensorFlow to train efficient neural networks

Neural Networks and their implementation decoded with TensorFlow

About This Book

  • Develop a strong background in neural network programming from scratch, using the popular Tensorflow library.
  • Use Tensorflow to implement different kinds of neural networks – from simple...
The Definitive Guide to Firebase: Build Android Apps on Google's Mobile Platform
The Definitive Guide to Firebase: Build Android Apps on Google's Mobile Platform

Plan how to build a better app, grow it into a business, and earn money from your hard work using Firebase. In this book, Laurence Moroney, Staff Developer Advocate at Google, takes you through each of the 15 Firebase technologies, showing you how to use them with concrete examples. You’ll see how to build cross-platform...

Azure Automation Using the ARM Model: An In-Depth Guide to Automation with Azure Resource Manager
Azure Automation Using the ARM Model: An In-Depth Guide to Automation with Azure Resource Manager

Focus exclusively on the Azure Resource Manager (ARM) deployment model for Azure automation and gain in-depth knowledge of topics such as runbook authoring, different types of automation runbooks, and hybrid cloud automation. This book covers practical approaches to creating runbooks for multiple use cases, including operational tasks such as...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Java Unit Testing with JUnit 5: Test Driven Development with JUnit 5
Java Unit Testing with JUnit 5: Test Driven Development with JUnit 5
Explore the new way of building and maintaining test cases with Java test driven development (TDD) using JUnit 5. This book doesn't just talk about the new concepts, it shows you ways of applying them in TDD and Java 8 to continuously deliver code that excels in all metrics. 


Unit testing...
Data Merge and Styles for Adobe InDesign CC 2018: Creating Custom Documents for Mailouts and Presentation Packages
Data Merge and Styles for Adobe InDesign CC 2018: Creating Custom Documents for Mailouts and Presentation Packages
Harness the power of Adobe InDesign's data merge and style panel. Whether you're creating custom mail-outs or other mail-merge needs, familiarize yourself with this powerful InDesign panel in this in-depth, step-by-step guide. This book shows you how to easily create, edit, and print data merged documents that match...
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code

Inject dependencies and write highly maintainable and flexible code using the new .NET Core DI Engine

About This Book

  • Identify when to use the constructors, parameters, setters, or Interface Injection, for best results
  • Build dependencies not only for MVC within .NET but also for other...
The Savage: A Novel
The Savage: A Novel

In the raucous and action-packed follow-up to Donnybrook, mayhem is still the order of the day―only more so

The dollar has failed; the grid is wiped out. Walmarts are looted and homes are abandoned as common folk flee and bloodthirsty militias fight for power. In a twenty-first century America gone haywire,...

Machine Learning and Cognition in Enterprises: Business Intelligence Transformed
Machine Learning and Cognition in Enterprises: Business Intelligence Transformed

Learn about the emergence and evolution of IT in the enterprise, see how machine learning is transforming business intelligence, and discover various cognitive artificial intelligence solutions that complement and extend machine learning. In this book, author Rohit Kumar explores the challenges when these concepts...

The Windows 10 Productivity Handbook: Discover Expert Tips, Tricks, and Hidden Features in Windows 10
The Windows 10 Productivity Handbook: Discover Expert Tips, Tricks, and Hidden Features in Windows 10
Use the tricks and hidden features in this guide to become more productive with Windows 10. You will save time, achieve more, and feel in control like never before.

Author Mike Halsey is a Microsoft MVP (Most Valuable Professional) awardee and technical expert. As the author of Windows 7, 8, and 10 Troubleshooting
...
Social Media Analytics Strategy: Using Data to Optimize Business Performance
Social Media Analytics Strategy: Using Data to Optimize Business Performance

This book shows you how to use social media analytics to optimize your business performance. The tools discussed will prepare you to create and implement an effective digital marketing strategy. From understanding the data and its sources to detailed metrics, dashboards, and reports, this book is a robust tool for anyone seeking a tangible...

Result Page: Previous 32 33 34 35 36 37 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy