Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.

In DevOps for Digital Leaders, deep collective experience on both...
Social and Political Implications of Data Mining: Knowledge Management in E-Government
Social and Political Implications of Data Mining: Knowledge Management in E-Government
In recent years, data mining has become a powerful tool in assisting society with its various layers and individual elements useful in obtaining intelligent information for making knowledgeable decisions. In the realm of knowledge discovery, data mining is becoming one of the most popular topics in information technology.

Social...

Data Mining and Statistics for Decision Making
Data Mining and Statistics for Decision Making
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Data mining is usually associated with a business or an organization's need to identify...
Web as History: Using Web Archives to Understand the Past and the Present
Web as History: Using Web Archives to Understand the Past and the Present
The World Wide Web has now been in use for more than 20 years. From early browsers to today’s principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe ‘if it’s not online, it doesn’t exist.’ While this statement is not...
Practical SQL: A Beginner's Guide to Storytelling with Data
Practical SQL: A Beginner's Guide to Storytelling with Data

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as...

Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use

Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Encyclopedia of Information Science and Technology, Fourth Edition
Encyclopedia of Information Science and Technology, Fourth Edition

In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing...

Open-Source ESBs in Action
Open-Source ESBs in Action
Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code....
Result Page: 78 77 76 75 74 73 72 71 70 69 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy