|
|
|
|
|
| | Cody's Data Cleaning Techniques Using SAS, Second EditionAlthough this book is titled Cody’s Data Cleaning Techniques Using SAS, I hope that it is more than that. It is my hope that not only will you discover ways to detect data errors, but you will also be exposed to some DATA step programming techniques and SAS procedures that might be new to you.
I have been teaching a two-day data... | | |
|
| | Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... | | Optimizing and Testing WLANsAs WLANs (Wireless Local Area Networks) become increasingly common, its becoming vital to be able to test them for proper performance and to optimize their operation. This book, written by a member of the IEEE committee that develops WLAN standards, is the first book addressing that need. It covers test equipment and methods for the RF (wireless)... |
|
Secure Semantic Service-Oriented Systems
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is... | | | | Ethics for CPAs: Meeting Expectations in Challenging TimesAccountants are under attack. Recent investigations of Enron, Global Crossing, WorldCom, and Adelphia, just to name a few, along with the remarkable collapse of Arthur Andersen, have focused the nation’s attention on the accounting profession and the need for reforms. All parties agree that accounting firms must change their priorities and... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |