Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Research and Trends in Data Mining Technologies and Applications
Research and Trends in Data Mining Technologies and Applications
In enterprises, a large volume of data has been collected and stored in data warehouses. Advances in data gathering, storage, and distribution have created a need for integrating data warehousing and data mining techniques. Mining data warehouses raises unique issues and requires special attention. Data warehousing and data mining are...
Debugging Applications for Microsoft .NET and Microsoft Windows
Debugging Applications for Microsoft .NET and Microsoft Windows

You get huge development advantages with Microsoft visual Studio .NET 2003—but you need a new bag of debugging tricks to take full advantage of them in today’s .NET and Win32 development worlds. Learn lethally effective, real-world application debugging techniques for .NET Framework 1.1 and windows with this fully updated...

Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

Automating System Administration with Perl: Tools to Make You More Efficient
Automating System Administration with Perl: Tools to Make You More Efficient

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely...

Perl for System Administration : Managing multi-platform environments with Perl
Perl for System Administration : Managing multi-platform environments with Perl
Some people plan to become administrators. The rest of us are thrust into it: we are webmasters, hobbyists, or just the default "technical people" on staff who are expected to keep things running. After some stumbling around repeating the same steps over and over again (and occasionally paying the price when we forget one), we realize...
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

The need for every professional to have a solid presence on the Internet is more important than ever before. Having a presence beyond an email account, such as a custom web page or web application, usually requires a clumsy assortment of outside services or hiring a dedicated administrator. Thus it is more sensible for the...

ASP.NET at Work: Building 10 Enterprise Projects with CDROM
ASP.NET at Work: Building 10 Enterprise Projects with CDROM
Improve your ASP.NET know-how by building 10 ready-to-use applications

ASP.NET provides developers with more functionality and flexibility to develop dynamic Web applications while at the same time writing less code. If you’re an ASP developer familiar with ASP.NET and Visual Studio .NET basics but unsure of how to connect all of these...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Making PIC Microcontroller Instruments and Controllers
Making PIC Microcontroller Instruments and Controllers

Essential Design Techniques From the Workbench of a Pro

Harness the power of the PIC microcontroller unit with practical, common-sense instruction from an engineering expert. Through eight real-world projects, clear illustrations, and detailed schematics, Making PIC Microcontroller Instruments and Controllers...

Drupal 7 Mobile Web Development Beginner's Guide
Drupal 7 Mobile Web Development Beginner's Guide
It's not an overstatement to say that handhelds have changed the world. What was, just 10 years ago, simply a phone is now the center of your online life and, for many users, their primary Internet device. The power of the smart phone is shaking up the world from Main Street and Wall Street to Pennsylvania Avenue and Downing...
Big Data Analytics Using Splunk: Deriving Operational Intelligence from Social Media, Machine Data, Existing Data Warehouses, and Other Real-Time Streaming Sources
Big Data Analytics Using Splunk: Deriving Operational Intelligence from Social Media, Machine Data, Existing Data Warehouses, and Other Real-Time Streaming Sources

Big Data Analytics Using Splunk is a hands-on book showing how to process and derive business value from big data in real time. Examples in the book draw from social media sources such as Twitter (tweets) and Foursquare (check-ins). You also learn to draw from machine data, enabling you to analyze, say, web server log files and...

The Little SAS Book for Enterprise Guide 4.1
The Little SAS Book for Enterprise Guide 4.1
For over three decades, SAS software has been used by programmers, analysts, and scientists to manipulate and analyze data. Today, SAS (pronounced sass) is used around the world in 110 countries, at over 40,000 sites, by more than 4.5 million users. SAS users stay with SAS year after year because they know its broad flexibility and depth of...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy