It is a rational and interesting option to teach deep analytics in various academic programs of various Business Management programs (e.g. Technology Management, Information Technology, Information Systems, Management Information Systems (MIS), Strategic Management and Analytics for BBA, MBA, PGDM, PGDBM) and also Electrical and Electronics Engineering.
Artificial Intelligence for Business: A Roadmap for Getting Started with AI will provide the reader with an easy to understand roadmap for how to take an organization through the adoption of AI technology. It will first help with the identification of which business problems and opportunities are right for AI and how to prioritize them to maximize the likelihood of success.
Time series forecasting is different from other machine learning problems. The key difference is the fixed sequence of observations and the constraints and additional structure this provides
Each of the fun craft activities included in this book will teach you about a key concept of computer programming and can be done completely offline. Then you can put your skills into practice by trying out the simple programs provided in the online, child-friendly computer language Scratch.
Gain valuable insights into the network and application protocols, and the key fields in each protocol Use Wireshark's powerful statistical tools to analyze your network and leverage its expert system to pinpoint network problems Master Wireshark and train it as your network sniffer
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.
Get up to speed with the deep learning concepts of Pytorch using a problem-solution approach. Starting with an introduction to PyTorch, you'll get familiarized with tensors, a type of data structure used to calculate arithmetic operations and also learn how they operate. You will then take a look at probability distributions using PyTorch and get acquainted with its concepts. Further you will dive into transformations and graph computations with PyTorch. Along the way you will take a look at common issues faced with neural network implementation and tensor differentiation, and get the best solutions for them.
“There’s an incredible amount of depth and thinking in the practices described here, and it’s impressive to see it all in one place.” —Win Treese, coauthor of Designing Systems for Internet Commerce The Practice of Cloud System Administration, Volume 2, focuses on “distributed” or “cloud” computing and brings a DevOps/SRE sensibility to the practice of system administration. Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach.
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark Become an expert in cracking WiFi passwords, penetrating anti-virus networks, sniffing the network, and USB hacks This step-by-step guide shows you how to confidently and quickly detect vulnerabilities for your network before the hacker does
Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd Edition, updated to address Nagios 3.0, will help you take full advantage of this program.
Implement natural language processing applications with Python using a problem-solution approach. This book has numerous coding exercises that will help you to quickly deploy natural language processing techniques, such as text classification, parts of speech identification, topic modeling, text summarization, text generation, entity extraction, and sentiment analysis.
This new edition is based on vSphere 6.5 and covers new features in different areas, including management, security, scalability, availability and more Design, deploy and manage VMware datacenters Implement monitoring and security of VMware workloads with ease
Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book―Amazon, Microsoft, Google, and PythonAnywhere.
Build machine learning models, natural language processing applications, and recommender systems with PySpark to solve various business challenges. This book starts with the fundamentals of Spark and its evolution and then covers the entire spectrum of traditional machine learning algorithms along with natural language processing and recommender systems using PySpark.
There are many good Java programming books on the market, but it's not easy to find one fit for a beginner. This book simplifies the complexity of Java programming and guides you through the journey to effectively work under the hood.
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
80 hands-on recipes to efficiently work with the Docker 1.6 environment on Linux About This Book Provides practical techniques and knowledge of various emerging and developing APIs to help you create scalable services Create, manage, and automate production-quality services while dealing with inherent issues.