万本电子书0元读

万本电子书0元读

顶部广告

Hands-On Recommendation Systems with Python电子书

售       价:¥

4人正在读 | 0人评论 9.8

作       者:Rounak Banik

出  版  社:Packt Publishing

出版时间:2018-07-31

字       数:15.4万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Secure your Java applications by integrating the Spring Security framework in your code Key Features *Provide authentication, authorization and other security features for Java applications. *Learn how to secure microservices, cloud, and serverless applications easily *Understand the code behind the implementation of various security features Book Description Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain. Hands-On Spring Security 5 for Reactive Applications starts with the essential concepts of reactive programming, Spring Framework, and Spring Security. You will then learn about a variety of authentication mechanisms and how to integrate them easily with the Spring MVC application. You will also understand how to achieve authorization in a Spring WebFlux application using Spring Security.You will be able to explore the security confgurations required to achieve OAuth2 for securing REST APIs and integrate security in microservices and serverless applications. This book will guide you in integrating add-ons that will add value to any Spring Security module. By the end of the book, you will be proficient at integrating Spring Security in your Java applications What you will learn *Understand how Spring Framework and Reactive application programming are connected *Implement easy security confgurations with Spring Security expressions *Discover the relationship between OAuth2 and OpenID Connect *Secure microservices and serverless applications with Spring *Integrate add-ons, such as HDIV, Crypto Module, and CORS support *Apply Spring Security 5 features to enhance your Java reactive applications Who this book is for If you are a Java developer who wants to improve application security, then this book is for you. A basic understanding of Spring, Spring Security framework, and reactive applications is required to make the most of the book.
目录展开

Title Page

Copyright and Credits

Hands-On Recommendation Systems with Python

Dedication

Packt Upsell

Why subscribe?

PacktPub.com

Contributors

About the author

About the reviewer

Image credits

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the example code files

Download the color images

Code in action

Conventions used

Get in touch

Reviews

Getting Started with Recommender Systems

Technical requirements

What is a recommender system?

The prediction problem

The ranking problem

Types of recommender systems

Collaborative filtering

User-based filtering

Item-based filtering

Shortcomings

Content-based systems

Knowledge-based recommenders

Hybrid recommenders

Summary

Manipulating Data with the Pandas Library

Technical requirements

Setting up the environment

The Pandas library

The Pandas DataFrame

The Pandas Series

Summary

Building an IMDB Top 250 Clone with Pandas

Technical requirements

The simple recommender

The metric

The prerequisties

Calculating the score

Sorting and output

The knowledge-based recommender

Genres

The build_chart function

Summary

Building Content-Based Recommenders

Technical requirements

Exporting the clean DataFrame

Document vectors

CountVectorizer

TF-IDFVectorizer

The cosine similarity score

Plot description-based recommender

Preparing the data

Creating the TF-IDF matrix

Computing the cosine similarity score

Building the recommender function

Metadata-based recommender

Preparing the data

The keywords and credits datasets

Wrangling keywords, cast, and crew

Creating the metadata soup

Generating the recommendations

Suggestions for improvements

Summary

Getting Started with Data Mining Techniques

Problem statement

Similarity measures

Euclidean distance

Pearson correlation

Cosine similarity

Clustering

k-means clustering

Choosing k

Other clustering algorithms

Dimensionality reduction

Principal component analysis

Other dimensionality reduction techniques

Linear-discriminant analysis

Singular value decomposition

Supervised learning

k-nearest neighbors

Classification

Regression

Support vector machines

Decision trees

Ensembling

Bagging and random forests

Boosting

Evaluation metrics

Accuracy

Root mean square error

Binary classification metrics

Precision

Recall

F1 score

Summary

Building Collaborative Filters

Technical requirements

The framework

The MovieLens dataset

Downloading the dataset

Exploring the data

Training and test data

Evaluation

User-based collaborative filtering

Mean

Weighted mean

User demographics

Item-based collaborative filtering

Model-based approaches

Clustering

Supervised learning and dimensionality reduction

Singular-value decomposition

Summary

Hybrid Recommenders

Technical requirements

Introduction

Case study – Building a hybrid model

Summary

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部