Home | Amazing | Today | Tags | Publishers | Years | Search 
Scaling Big Data with Hadoop and Solr
Scaling Big Data with Hadoop and Solr

As data grows exponentially day-by-day, extracting information becomes a tedious activity in itself. Technologies like Hadoop are trying to address some of the concerns, while Solr provides high-speed faceted search. Bringing these two technologies together is helping organizations resolve the problem of information extraction from Big Data...

IgG4-Related Disease
IgG4-Related Disease

IgG4-related disease is a new systemic disease that has only recently been identified and characterized. However, most clinical practitioners are not yet familiar with it and thus are likely to misdiagnose it. The purpose of this book is to raise awareness of this disease and its diagnostic pitfalls. A wealth of radiological and...

Waste to Energy: Opportunities and Challenges for Developing and Transition Economies
Waste to Energy: Opportunities and Challenges for Developing and Transition Economies

Solid waste management is currently a major issue worldwide with numerous areas reaching critical levels. Many developing countries and countries in transition still miss basic waste management  infrastructure and awareness. It is here that many of the solid waste management problems and challenges are currently being faced. As such,...

Mapping Archaeological Landscapes from Space
Mapping Archaeological Landscapes from Space

'Given the rising awareness and interest in aerial and satellite remote sensing, there is a need to familiarize archaeologists with the basic principles and applications of what have become the most useful technologies. This volume, in the Springerbriefs Archaeologial Heritage Management series, accomplishes this. Contributions to the...

Mobile and Ubiquitous Systems: Computing, Networking, and Services: 9th International Conference
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 9th International Conference

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous...

Small Business Smarts: Building Buzz with Social Media
Small Business Smarts: Building Buzz with Social Media

Social networking plus small business is a slam dunk! Small Business Smarts: Building Buzz with Social Media explains why that's so and helps small business owners decide whether social media tools are right for them. Assuming the answer is yes, the book offers concrete advice and implementation suggestions that make using tools to...

Network Security Through Data Analysis: Building Situational Awareness
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...

Anesthesia and Uncommon Diseases: Expert Consult – Online and Print, 6e
Anesthesia and Uncommon Diseases: Expert Consult – Online and Print, 6e

Your awareness of uncommon diseases and possible complications is vital to successful anesthetic patient management. Anesthesia and Uncommon Diseases, 6th Edition, brings you up to date with new information on less commonly seen diseases and conditions, including the latest evidence and management guidelines. This unique medical reference...

Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science
Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science

Key Features

  • This book contains recipes on how to use Apache Spark as a unified compute engine
  • Cover how to connect various source systems to Apache Spark
  • Covers various parts of machine learning including supervised/unsupervised learning & recommendation engines

Book...

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

What Makes Your Brain Happy and Why You Should Do the Opposite
What Makes Your Brain Happy and Why You Should Do the Opposite

This book reveals a remarkable paradox: what your brain wants is frequently not what your brain needs. In fact, much of what makes our brains "happy" leads to errors, biases, and distortions, which make getting out of our own way extremely difficult.

Author David DiSalvo presents evidence from evolutionary and
...

Facets of Virtual Environments: First International Conference, FaVE 2009, Berlin, Germany, July 27-29, 2009, Revised Selected Papers (Lecture Notes ... and Telecommunications Engineering)
Facets of Virtual Environments: First International Conference, FaVE 2009, Berlin, Germany, July 27-29, 2009, Revised Selected Papers (Lecture Notes ... and Telecommunications Engineering)

In recent years, the popularity of virtual worlds has increased significantly and they have consequently come under closer academic scrutiny. Papers about virtual worlds are typically published at conferences or in journals that specialize in something - tirely different, related to some secondary aspect of the research. Thus a paper d-...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy