Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Data Analysis with Pandas

You're reading from   Hands-On Data Analysis with Pandas Efficiently perform data collection, wrangling, analysis, and visualization using Python

Arrow left icon
Product type Paperback
Published in Jul 2019
Publisher
ISBN-13 9781789615326
Length 740 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Stefanie Molin Stefanie Molin
Author Profile Icon Stefanie Molin
Stefanie Molin
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Preface 1. Section 1: Getting Started with Pandas
2. Introduction to Data Analysis FREE CHAPTER 3. Working with Pandas DataFrames 4. Section 2: Using Pandas for Data Analysis
5. Data Wrangling with Pandas 6. Aggregating Pandas DataFrames 7. Visualizing Data with Pandas and Matplotlib 8. Plotting with Seaborn and Customization Techniques 9. Section 3: Applications - Real-World Analyses Using Pandas
10. Financial Analysis - Bitcoin and the Stock Market 11. Rule-Based Anomaly Detection 12. Section 4: Introduction to Machine Learning with Scikit-Learn
13. Getting Started with Machine Learning in Python 14. Making Better Predictions - Optimizing Models 15. Machine Learning Anomaly Detection 16. Section 5: Additional Resources
17. The Road Ahead 18. Solutions
19. Other Books You May Enjoy Appendix

Exercises

Complete the following exercises to practice the concepts covered in this chapter:

  1. Run the simulation for December 2018 into new log files without making the user base again. Be sure to run python simulate.py -h to review the command-line arguments. Set the seed to 27. This data will be used for the remaining exercises.
  2. Find the number of unique usernames, attempts, successes, failures, and the success/failure rates per IP address, using the data simulated in exercise #1.
  3. Create two subplots with failures versus attempts on the left, and failure rate versus distinct usernames on the right. Draw decision boundaries for the resulting plots. Be sure to color each data point by whether or not it is a hacker IP address.
  4. Build a rule-based criteria using percentage difference from the median that flags an IP address if the failures and attempts are both five times their...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image