Python Data Analysis Cookbook
Analyze Big Data sets, create attractive visualizations, and manipulate and process various data types
Packed with rich recipes to help you learn and explore amazing algorithms for statistics and machine learning
Authored by Ivan Idris, expert in python programming and proud
Everyday Scripting with Ruby: For Teams, Testers, and You Are you a tester who spends more time manually creating complex test data than using it? A business analyst who seemingly went to college all those years so you can spend your days copying data from reports into spreadsheets? A programmer who can't finish each day's task without having to scan through version control system output, looking for the... Domain-Driven Design Distilled
Domain-Driven Design (DDD) software modeling delivers powerful results in practice, not just in theory, which is why developers worldwide are rapidly moving to adopt it. Now, for the first time, there’s an accessible guide to the basics of DDD: What it is, what problems it solves, how it works, and how to quickly...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research... The Fractal Structure of Data Reference: Applications to the Memory Hierarchy For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
PC Repair Bench Book Your one-stop guide to
- Understanding and repairing motherboards, processors, chipsets, BIOS, and system resources
- Updating and optimizing memory and aging systems
- Diagnosing common PC problems and performing routine maintenance
- Installing and configuring system upgrades
Data Protection and Information Lifecycle Management
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...
Microsoft(r) Windows(r) 2000 Server Administrator's Companion MICROSOFT WINDOWS 2000 SERVER ADMINISTRATOR'S COMPANION brings network administrators, systems engineers, and other MIS professionals up to speed on the latest features of Windows 2000 Server, including Active Directory(tm) services, Microsoft Internet Information Server 4.0, the new, integrated console for administrative tools, and more. It's the... Packet Filtering: Catching the Cool Packets
This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...
|Result Page: 33 32 31 30 29 28 27 26 25 24 |