Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more

Buy

Leverage the power of Python to collect, process, and mine deep insights from social media data

About This Book

  • Acquire data from various social media platforms such as Facebook, Twitter, YouTube, GitHub, and more
  • Analyze and extract actionable insights from your social data using various Python tools
  • A highly practical guide to conducting efficient social media analytics at scale

Who This Book Is For

If you are a programmer or a data analyst familiar with the Python programming language and want to perform analyses of your social data to acquire valuable business insights, this book is for you. The book does not assume any prior knowledge of any data analysis tool or process.

What You Will Learn

  • Understand the basics of social media mining
  • Use PyMongo to clean, store, and access data in MongoDB
  • Understand user reactions and emotion detection on Facebook
  • Perform Twitter sentiment analysis and entity recognition using Python
  • Analyze video and campaign performance on YouTube
  • Mine popular trends on GitHub and predict the next big technology
  • Extract conversational topics on public internet forums
  • Analyze user interests on Pinterest
  • Perform large-scale social media analytics on the cloud

In Detail

Social Media platforms such as Facebook, Twitter, Forums, Pinterest, and YouTube have become part of everyday life in a big way. However, these complex and noisy data streams pose a potent challenge to everyone when it comes to harnessing them properly and benefiting from them. This book will introduce you to

(HTML tags aren't allowed.)

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning
TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning

Learn how to solve challenging machine learning problems with TensorFlow, Google’s revolutionary new software library for deep learning. If you have some background in basic linear algebra and calculus, this practical book introduces machine-learning fundamentals by showing you how to design systems capable of detecting objects...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...


Java in 21 Days, Sams Teach Yourself (Covering Java 8) (7th Edition)
Java in 21 Days, Sams Teach Yourself (Covering Java 8) (7th Edition)

In just 21 days you can acquire the knowledge and skills necessary to develop applications on your computer and apps that run on Android phones and tablets. With this complete tutorial you’ll quickly master the basics and then move on to more advanced features and concepts.

Completely updated for Java 8,...

MySQL and JSON: A Practical Programming Guide
MySQL and JSON: A Practical Programming Guide
Practical instruction on using JavaScript Object Notation (JSON) with MySQL


This hands-on guide teaches, step by step, how to use JavaScript Object Notation (JSON) with MySQL. Written by a MySQL Community Manager for Oracle, MySQL and JSON: A Practical Programming Guide...
IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy