Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark

Microsoft Azure has over 20 platform-as-a-service (PaaS) offerings that can act in support of a big data analytics solution. So which one is right for your project? This practical book helps you understand the breadth of Azure services by organizing them into a reference framework you can use when crafting your own big data analytics...

Analytics: The Agile Way (Wiley and SAS Business Series)
Analytics: The Agile Way (Wiley and SAS Business Series)
For decades now, companies big and small have embraced Agile software development methods. The rationale here is straightforward:
  • Why take one or two years to fully deploy a system, app, or website when so many things can and do go wrong?
  • Why try to cook one big batch and boil the ocean?
  • ...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Information and Coding Theory (Springer Undergraduate Mathematics Series)
Information and Coding Theory (Springer Undergraduate Mathematics Series)
As thi s Preface is being written, th e twent ieth century is coming to an end . Historians may perhaps come to refer to it as the cent ury of information, jus t as its predecessor is associated with the proce ss of indust rialisation. Successive technological developments such as the telephone, radio, television , compute rs and...
Python High Performance Programming
Python High Performance Programming

If you have at least a basic knowledge of Python, this book will help you maximize the performance of your code and applications. Easy to follow tutorials will make you a hard act to follow in Python programming.

Overview

  • Identify the bottlenecks in your applications and solve them using the best...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

WordPress Web Application Development
WordPress Web Application Development

Developing WordPress-powered websites is one of the standout trends in the modern web development world. The flexibility and power of the built-in features offered by WordPress has made developers turn their attentions to the possibility of using it as a web development framework. This book will act as a comprehensive resource for building...

Free Will: An Introduction (Palgrave Philosophy Today)
Free Will: An Introduction (Palgrave Philosophy Today)
Can we ever act freely if everything we do is determined by our genes, our upbringing and our environment? On the other hand, if everything we do isn't determined, is it just a matter of luck what we do? What are the requirements on acting freely: are they easily satisfied by ordinary people so long as they aren't coerced or manipulated...
Debugging With GDB: The Gnu Source-Level Debugger
Debugging With GDB: The Gnu Source-Level Debugger
The GNU Debugger allows you to see what is going on "inside" a program while it executes - or what a program was doing at the moment it crashed.

GDB supports C, C++, Java, Fortran and Assembly among other languages; it is also designed to work closely with the GNU Compiler Collection (GCC).

The GNU Debugger Program has four...

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything

Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book.

Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal...

Inside the Microsoft Build Engine: Using MSBuild and Team Foundation Build
Inside the Microsoft Build Engine: Using MSBuild and Team Foundation Build

Often when people think about build, they think just about the act of compiling some source code – when I hit F5 in the IDE, it builds, right? Well yes, kind of. In a real production build system, there is so much more to it than that. There are many kinds of builds – F5, desktop, nightly, continuous, rolling, gated, buddy etc....

Result Page: 37 36 35 34 33 32 31 30 29 28 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy