 |
|
|
|
 Anonymous Communication Networks: Protecting Privacy on the Web
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Addressing the demand for authoritative information on... |  |  Learning Data Mining with Python
Harness the power of Python to analyze data and create insightful predictive models
About This Book
-
Learn data mining in practical terms, using a wide variety of libraries and techniques
-
Learn how to find, manipulate, and analyze data using Python
-
Step-by-step instructions...
|  |  Inside SQLiteSQLite is a small, zero-configuration, custom-tailored, embeddable, threadsafe, easily maintainable, transactionoriented, SQL-based, relational database management system. There is no separate install or setup procedure to initialize SQLite before using it. There is no configuration file.
SQLite is open source, and... |
|
 QoS and QoE Management in UMTS Cellular SystemsThis comprehensive volume provides state-of-the art guidance on Quality of Service (QoS) and Quality of end-user Experience (QoE) management in UMTS cellular systems, tackling planning, provisioning, monitoring and optimisation issues in a single accessible resource. In addition, a detailed discussion is provided on service applications, QoS... |  |  |  |  Introduction to Information Theory and Data Compression, Second EditionAn effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this unique text allows either topic to be presented independently, and it was specifically designed so that the data compression section requires... |
|
|
 VPNs Illustrated : Tunnels, VPNs, and IPsecVirtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually... |  |  Learning Docker - Second Edition: Build, ship, and scale faster
Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture
About This Book
-
This up-to-date edition...
|  |  Statistics and Data with R: An applied approach through examplesR, an Open Source software, has become the de facto statistical computing environment. It has an excellent collection of data manipulation and graphics capabilities. It is extensible and comes with a large number of packages that allow statistical analysis at all levels – from simple to advanced – and in numerous fields... |
|
|
Result Page: 67 66 65 64 63 62 61 60 59 58 |