 |
|
 Citrix Access Gateway VPX 5.04 Essentials
A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
Overview
-
A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
-
Establish secure access...
|  |  Unsupervised Learning with R
Work with over 40 packages to draw inferences from complex datasets and find hidden patterns in raw unstructured data
About This Book
-
Unlock and discover how to tackle clusters of raw data through practical examples in R
-
Explore your data and create your own models from scratch
... |  |  CentOS 6 Linux Server Cookbook
An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.
-
Delivering comprehensive insight into CentOS server with a series of starting points that show you...
|
|
 UNIX System Programming for System VR4 (Nutshell Handbooks)
Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing... |  |  Understanding Swift Programming
Covers Swift 2
Swift, Apple's new language for app development, has been widely praised for its clean, safe, and feature-rich design. The language is poised to quickly replace Objective-C for developing iOS apps.
Swift is now the 14th most popular language (Objective-C is #18, having sunk like a stone from #3) as... |  |  |
|
 GARCH Models: Structure, Statistical Inference and Financial Applications
Provides a comprehensive and updated study of GARCH models and their applications in finance, covering new developments in the discipline
This book provides a comprehensive and systematic approach to understanding GARCH time series models and their applications whilst presenting the most advanced results... |  |  Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.
You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more... |  |  Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |