Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS

Leverage the capabilities of SAS to process and analyze Big Data

About This Book

  • Combine SAS with platforms such as Hadoop, SAP HANA, and Cloud Foundry-based platforms for effecient Big Data analytics
  • Learn how to use the web browser-based SAS Studio and iPython Jupyter Notebook...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Time Series Analysis and Its Applications: With R Examples (Springer Texts in Statistics)
Time Series Analysis and Its Applications: With R Examples (Springer Texts in Statistics)

Time Series Analysis and Its Applications presents a balanced and comprehensive treatment of both time and frequency domain methods with accompanying theory. Numerous examples using nontrivial data illustrate solutions to problems such as discovering natural and anthropogenic climate change, evaluating pain perception...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

Accelerated C# 2005
Accelerated C# 2005

Accelerated C# 2005 teaches you both how to use core C# language concepts and wisely employ C# idioms and object-oriented design patterns--to exploit the power of C# and the common language runtime. You'll quickly master C# syntax while learning how the CLR simplifies many programming tasks. You'll also learn best practices that ensure...

Programming the Microsoft Windows Driver Model, Second Edition
Programming the Microsoft Windows Driver Model, Second Edition

Writing a WDM driver is much like writing a kernel-mode driver for Windows NT 4.0. It's a bit easier because you don't have to detect and configure your own hardware. Ironically, it's simultaneously harder because correctly handling Plug and Play and power management is fiendishly difficult. If...

QuickTime for the Web: For Windows and Macintosh, Third Edition (QuickTime Developer Series)
QuickTime for the Web: For Windows and Macintosh, Third Edition (QuickTime Developer Series)
QuickTime is the industry standard for developing and distributing multimedia content on the Web and CD-ROM, for both Windows and Macintosh computers. Its powerful, extensible software architecture lets you deliver state-of-the-art digital content over the Web or on CD-ROM.

This third edition of the best-selling and award-winning
...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Combinatorial Algorithms for Computers and Calculators (Computer science and applied mathematics)
Combinatorial Algorithms for Computers and Calculators (Computer science and applied mathematics)

Since the appearance in 1975 of this work, the field of combinatorial algorithms has continued its rapid evolution. We have substantially rewritten several of the chapters in order to take account of theoretical or algorithmic improvements, and to clarify the presentation.

The result has been that a number of speedups,
...

Cardiac Gene Expression: Methods and Protocols (Methods in Molecular Biology)
Cardiac Gene Expression: Methods and Protocols (Methods in Molecular Biology)

This book presents both cutting-edge and established methods for studying cardiac gene expression. The protocols provide a template for solid research, and cover the process through screening, analysis, characterization, and functional confirmation of novel genes or known genes with a new function. The concluding section of the book...

AspectJ Cookbook
AspectJ Cookbook
This hands-on book shows readers why and how common Java development problems can be solved by using new Aspect-oriented programming (AOP) techniques. With a wide variety of code recipes for solving day-to-day design and coding problems using AOP's unique approach, AspectJ Cookbook demonstrates that AOP is more than...
Result Page: 38 37 36 35 34 33 32 31 30 29 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy