Build your own robo-advisor in Python to manage your investments and get up and running in no time
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
Explore the use cases,……続きを見る
The authors of this book assert that Grid Square statistics, a method of aggregating data within a geographically defined Grid, may be an effective solution to approach geospatial data for big data ……続きを見る
The essential guide for writing portable, parallel programs for GPUs using the OpenMP programming model.
Today’s computers are complex, multi-architecture systems: multiple cores in a shared address……続きを見る
Three of the world’s most accomplished and deep thinkers come together to explore Artificial Intelligence (AI) and the way it is transforming human societyーand what this technology means for us all……続きを見る
Formal Verification: An Essential Toolkit for Modern VLSI Design, Second Edition presents practical approaches for design and validation, with hands-on advice to help working engineers integrate the……続きを見る
Streaming data is a big deal in big data these days. As more and more businesses seek to tame the massive unbounded data sets that pervade our world, streaming systems have finally reached a level o……続きを見る
This book follows a tutorial approach with examples and step-by-step instructions to help explain the key concepts of the LOVE framework as well as everything you need to know about game development……続きを見る
THE ESSENTIAL HANDBOOK FOR EFFECTIVELY COMMUNICATING ENVIRONMENTAL, SAFETY, AND HEALTH RISKS, FULLY REVISED AND UPDATED
Now in its sixth edition, Risk Communication has proven to be a valuable resou……続きを見る
Practical, hands-on solutions in Python to overcome any problem in Machine Learning About This Book • Master the advanced concepts, methodologies, and use cases of machine learning • Build ML applic……続きを見る
著者:Linda King
出版社: Emereo Publishing
発売日: 2012年10月24日
Harness the Power of Social Networking with Facebook Applications: Everything you need to know to build a Facebook application, If you are interested in or getting started with building Facebook app……続きを見る
Numerical algorithms, modern programming techniques, and parallel computing are often taught serially across different courses and different textbooks. The need to integrate concepts and tools usual……続きを見る
The first part of this preface is for the student; the second for the instructor. But whoever you are, welcome to both parts. For the Student You have finished secondary school, and are about to beg……続きを見る
The importance of accuracy verification methods was understood at the very beginning of the development of numerical analysis. Recent decades have seen a rapid growth of results related to adaptive ……続きを見る
The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone th……続きを見る
Based on exciting discoveries in mathematics, genetics, psychology and sociology, ‘Connected’ is an innovative and fascinating exploration of how social networks operate.
Think it’s all about who yo……続きを見る
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability ……続きを見る
The growth in the use of sensor technology has led to the demand for image fusion: signal processing techniques that can combine information received from different sensors into a single composite i……続きを見る
Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Pack……続きを見る
No longer can the offline remain separate from the online. Integrated, customer-centric, cross-channel marketing campaigns persuade customers to act, provide greater ROI, and ultimately improve your……続きを見る
PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a pr……続きを見る
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Second Edition, discusses not only how to apply PCI in a practical and cost-effective way but more important……続きを見る
C is one of the oldest programming languages and still one of the most widely used. Whether you're an experienced C programmer or you're new to the language, you know how frustrating it can be to hu……続きを見る
Cisco Express Forwarding
Understanding and troubleshooting CEF in Cisco routers and switches
Nakia Stringfield, CCIE® No. 13451/Russ White, CCIE No. 2635/Stacia McKee
How does a router switch a pack……続きを見る
Take your idea from concept to production with this unique guide
Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to chann……続きを見る
Set theory is an autonomous and sophisticated field of mathematics that is extremely successful at analyzing mathematical propositions and gauging their consistency strength. It is as a field of mat……続きを見る
The most important properties of normal and Student t-distributions are presented. A number of applications of these properties are demonstrated. New related results dealing with the distributions o……続きを見る
This volume provides universal methodologies accompanied by Matlab software to manipulate numerous signal and image processing applications. It is done with discrete and polynomial periodic splines.……続きを見る
"Practical Maya Programming with Python" is a practical tutorial packed with plenty of examples and sample projects which guides you through building reusable, independent modules and handling unexp……続きを見る
This Springer Brief presents a comprehensive survey of the existing methodologies of background subtraction methods. It presents a framework for quantitative performance evaluation of different appr……続きを見る
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processi……続きを見る