Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Data Analysis Cookbook
Python Data Analysis Cookbook

Key Features

  • Analyze Big Data sets, create attractive visualizations, and manipulate and process various data types
  • Packed with rich recipes to help you learn and explore amazing algorithms for statistics and machine learning
  • Authored by Ivan Idris, expert in python programming and proud...
Everyday Scripting with Ruby: For Teams, Testers, and You
Everyday Scripting with Ruby: For Teams, Testers, and You
Are you a tester who spends more time manually creating complex test data than using it? A business analyst who seemingly went to college all those years so you can spend your days copying data from reports into spreadsheets? A programmer who can't finish each day's task without having to scan through version control system output, looking for the...
Domain-Driven Design Distilled
Domain-Driven Design Distilled

Domain-Driven Design (DDD) software modeling delivers powerful results in practice, not just in theory, which is why developers worldwide are rapidly moving to adopt it. Now, for the first time, there’s an accessible guide to the basics of DDD: What it is, what problems it solves, how it works, and how to quickly...

Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data
Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data

Wring more out of the data with a scientific approach to analysis

Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
PC Repair Bench Book
PC Repair Bench Book
Your one-stop guide to
  • Understanding and repairing motherboards, processors, chipsets, BIOS, and system resources
  • Updating and optimizing memory and aging systems
  • Diagnosing common PC problems and performing routine maintenance
  • Installing and configuring system upgrades
  • Working...
UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design (2nd Edition)
UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design (2nd Edition)

"This book manages to convey the practical use of UML 2 in clear and understandable terms with many examples and guidelines. Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and...

Apache Hive Essentials: Essential techniques to help you process, and get unique insights from, big data, 2nd Edition
Apache Hive Essentials: Essential techniques to help you process, and get unique insights from, big data, 2nd Edition

This book takes you on a fantastic journey to discover the attributes of big data using Apache Hive.

Key Features

  • Grasp the skills needed to write efficient Hive queries to analyze the Big Data
  • Discover how Hive can coexist and work with other tools within the Hadoop...
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...

Microsoft(r) Windows(r) 2000 Server Administrator's Companion
Microsoft(r) Windows(r) 2000 Server Administrator's Companion
MICROSOFT WINDOWS 2000 SERVER ADMINISTRATOR'S COMPANION brings network administrators, systems engineers, and other MIS professionals up to speed on the latest features of Windows 2000 Server, including Active Directory(tm) services, Microsoft Internet Information Server 4.0, the new, integrated console for administrative tools, and more. It's the...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy