Python
epub |eng | | Author:Paul Gries
Writing Algorithms That Use the File-Reading Techniques There are several common ways to organize information in files. The rest of this chapter will show how to apply the various file-reading ...
( Category:
Python
November 21,2019 )
epub, azw3, pdf |eng | 2017-05-16 | Author:CyberPunk Architects [Architects, CyberPunk]
Conclusion Here we are at the end of the road. We discussed basics when it comes to the hacking with step by step guides. I think now you are ready ...
( Category:
Hacking
May 20,2017 )
epub |eng | | Author:Sanjib Sinha
Understanding Classes and Objects You cannot understand theory unless you implement that concept into the real world. Let us see what we have learned. 1. Classes are when you create ...
( Category:
Hacking
March 21,2017 )
mobi, azw3, epub |eng | 2016-08-07 | Author:John V. Guttag
A rooted binary tree is an acyclic directed graph in which There is exactly one node with no parents. This is called the root. Each non-root node has exactly one ...
( Category:
Python
February 10,2017 )
epub, pdf |eng | | Author:Dipanjan Sarkar
def tfidf_transformer(bow_matrix): transformer = TfidfTransformer(norm='l2', smooth_idf=True, use_idf=True) tfidf_matrix = transformer.fit_transform(bow_matrix) return transformer, tfidf_matrix You can see that we have used the L2 norm option in the parameters and also made ...
( Category:
Python
January 9,2017 )
epub |eng | | Author:Marco Bonzanini
Visualizing posts as a word cloud After analyzing interactions, we move our attention back to the content of the posts. Word clouds, also called tag clouds (https://en.wikipedia.org/wiki/Tag_cloud), are visual representations ...
( Category:
Python
September 21,2016 )
epub |eng | 2013-05-22 | Author:Kevin Johnson [Johnson, Kevin]
Adjusting available memory While the latest model of the Raspberry Pi has increased the amount of RAM to 512MB from the 256MB in the original, it is still a far ...
( Category:
Python
June 15,2016 )
epub |eng | 2015-11-09 | Author:Blanco-Silva, Francisco J.
The equation has been classified as a member of several types. We can now solve it according to the proper techniques of the corresponding type. For instance, we choose to ...
( Category:
Python
April 26,2016 )
mobi, pdf |eng | 2016-02-02 | Author:Ryan Heitz
Note OMXPlayer works best with sound files ending in .mp3. Only some files ending in .wav will work. We’ll talk more about sound files and the OMXPlayer in chapter 8. ...
( Category:
Programming
March 31,2016 )
azw3, epub |eng | 2016-01-29 | Author:Gollapudi, Sunila [Gollapudi, Sunila]
Tip Rules originating from the same itemset usually have the same support, but vary with confidence. The minimum support (minsup) and the minimum confidence (minconf) are the values that are ...
( Category:
Java
March 31,2016 )
mobi, azw3, epub, pdf |eng | 2015-07-27 | Author:Vivian Bailey & Thomas Kirby
If-Statement If-Else Statement Let’s take them one by one. BASIC CONDITIONS These include all the arithmetic comparisons, such as less than (<), greater than (>), equal (=). For example: 3<4 ...
( Category:
Object-Oriented Design
March 11,2016 )
mobi, epub, azw3, pdf |eng | 2016-02-14 | Author:Chetan Giridhar
Understanding the Observer design pattern In the Observer design pattern, an object (Subject) maintains a list of dependents (Observers) so that the Subject can notify all the Observers about the ...
( Category:
Python
March 11,2016 )
epub, azw3 |eng | 2015-09-29 | Author:Duffy, Christopher
We did not get a hit for smith, but perhaps others will confirm during this attack. Before we write our script, you need to know the different error or control ...
( Category:
Network Security
January 31,2016 )
mobi |eng | 1999-09-10 | Author:Mark Lutz
754 | Chapter 25: Advanced Module Topics www.it-ebooks.info duced in Chapter 4, 3 .X b'...' bytes literals are taken as simple strings in 2 .X, and 2 .X u'...' Unicode ...
( Category:
Object-Oriented Design
January 6,2016 )
azw3 |eng | 2015-12-09 | Author:Blum, Richard & Bresnahan, Christine [Blum, Richard]
A. No, Python doesn’t support protected methods. You can, however, use the same idea as with private attributes and name your method starting with two underscores. The method is still ...
( Category:
Robotics & Automation
December 21,2015 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(11932)Hello! Python by Anthony Briggs(9396)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9360)
The Mikado Method by Ola Ellnestam Daniel Brolund(9325)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(7870)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7414)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7358)
Grails in Action by Glen Smith Peter Ledbrook(7311)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7136)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(5974)
Kotlin in Action by Dmitry Jemerov(4658)
Hands-On Full-Stack Web Development with GraphQL and React by Sebastian Grebe(3926)
Functional Programming in JavaScript by Mantyla Dan(3728)
Learning Java by Patrick Niemeyer & Daniel Leuck(2877)
Mastering Python for Finance by Weiming James Ma;(2854)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2848)
Windows APT Warfare by Sheng-Hao Ma(2803)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2629)
Mastering Java 9 by Dr. Edward Lavieri(2577)
Architecting Modern Java EE Applications: Designing lightweight, business-oriented enterprise applications in the age of cloud, containers, and Java EE 8 by Daschner Sebastian(2566)