Book Watch Archive


Common Sense, the Turing Test, and the Quest for Real AI (MIT Press)
Thursday, 25 January 2018

This book seeks to illustrate what artificial intelligence can teach us about the mind. If thinking is a computational process, then how can computation illuminate thinking? Author Hector J.Levesque is Professor Emeritus in the Department of Computer Science at the University of Toronto, and in this book he examines the research challenges facing AI, in particular how common sense reasoning remains an open problem.

<ASIN:0262036045>

 
Kubernetes In Action (Manning)
Wednesday, 24 January 2018

A comprehensive guide to developing and running applications in a Kubernetes environment. Before diving into Kubernetes, author Marko Luksa gives an overview of container technologies like Docker, including how to build containers, so that even readers who haven't used these technologies before can get up and running. It goers on to show how to build your first Kubernetes cluster. The examples show how to gradually expand your initial application, adding features and deepening your knowledge of Kubernetes architecture and operation.

<ASIN:1617293725>

 
Python: Advanced Predictive Analytics (Packt)
Monday, 22 January 2018

How to get started with predictive analytics using Python together with its array of packages for predictive modeling and suites of IDEs to choose from. Ashish Kumar and Joseph Babcock show how analysts can combine Python with sophisticated methods to build scalable analytic applications. The book covers Python libraries such as pandas, scikit-learn, and NumPy, and covers a wide range of algorithms for classification, regression, clustering, as well as techniques such as deep learning.

<ASIN:1788992369>

 
Head First Learn to Code (O'Reilly)
Thursday, 18 January 2018

This book is designed to teach you how to think computationally and how to write code to make your computer, mobile device, or anything with a CPU do things for you. Using Python and a step by step approach, author Eric Freeman shows the core concepts of programming alongside topics such as data structures, storage, abstraction, recursion, and modularity.

<ASIN:1491958863>

 
Mastering Machine Learning With Scikit-learn 2nd Ed (Packt)
Wednesday, 17 January 2018

Now in its second edition of this book shows how the algorithms and techniques offered by machine learning can be used to automate any analytical model. Author Gavin Hackeling examines a variety of machine learning models including popular machine learning algorithms including k-nearest neighbors, logistic regression, naive Bayes, k-means, decision trees, and artificial neural networks. It discusses data preprocessing, hyperparameter optimization, and ensemble methods.

<ASIN:1788299876>

 
Cryptography (River Publishers)
Monday, 15 January 2018

This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption.  Author William J Buchanan covers core cryptography alongside emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs. The book provides web-based material on almost every topic covered, alongside additional on-line material such as videos, source code, and labs.

<ASIN:8793379102>

 
The Nexus Framework For Scaling Scrum (Addison Wesley)
Thursday, 11 January 2018

This concise book shows how Nexus helps teams to deliver  complex, multi-platform software in short, frequent cycles, without straying from Scrum’s core principles. Using an extended case study, authors Kurt Bittner, Patricia Kong and Dave West show how to use Nexus to apply Scrum at scale across multiple teams, sites, and time zones. The Nexus Framework was created by Scrum.org, a training and certification organization founded by Scrum co-creator Ken Schwaber.

<ASIN:0134682661>

 
Grey Hat C# (No Starch Press)
Wednesday, 10 January 2018

This book shows how to use C#'s set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. Author Brandon Perry shows how with some help from Mono, you can write your own practical security tools that will run on Windows, Mac, Linux, and even mobile devices. The book starts with a crash course in C# and some of its advanced features before going on to look at how to create and automate security tools.

<ASIN:1593277598>

 
Programming for the Puzzled (MIT Press)
Monday, 08 January 2018

With a subtitle of "Learn to Program While Solving Puzzles", this book builds a bridge between the recreational world of algorithmic puzzles (puzzles that can be solved by algorithms) and the pragmatic world of computer programming, teaching readers to program while solving puzzles.  Author Srini Devadas has included twenty puzzles and seventy programming exercises that vary in difficulty. Each lesson starts with the description of a puzzle illustrating concepts required to solve similar problems, and the solution to the puzzle becomes the specification of the code to be written.

<ASIN:0262534304>

 
Arduino Project Handbook, Volume 2 (No Starch Press)
Thursday, 04 January 2018

In this second volume of the ­Arduino Project Handbook Mark Geddes delivers 25 more ­beginner-friendly electronics projects for hobbyists, parents, and educators. Get up and running with a crash course on the Arduino, and then pick any project that sparks your interest and start making!  Each project includes cost and time estimates, simple instructions, colorful photos and circuit diagrams, a troubleshooting section, and the complete code to bring your build to life.

<ASIN:1593278187>

 
Machine Learning Algorithms (Packt)
Wednesday, 03 January 2018

This guide to machine learning takes a solid, concept-rich, yet highly practical approach. Author Giuseppe Bonaccorso covers the whats and whys of machine learning algorithms and their implementation. The book is aimed at IT professionals who want to enter the field of data science and are very new to machine learning. Familiarity with languages such as R and Python will be invaluable.

<ASIN:1785889621>

 
Attacking Network Protocols (No Starch Press)
Tuesday, 02 January 2018

Take a deep dive into network protocol security with a specialist bug ­hunter. James Forshaw is a computer security researcher at Google Project Zero and the creator of the network protocol analysis tool Canape. His discovery of complex design issues in Microsoft Windows earned him the top bug bounty of $100,000 and placed him as the #1 researcher on the published list from Microsoft Security Response Center (MSRC). This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities.

<ASIN:1593277504>

 
«StartPrev71727374757677787980NextEnd»

Page 80 of 242