Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data is designed as a text for a one-semester or one-quarter course in survival analysis for upper-level or graduate students in statistics, biostatistics, and epidemiology. Prerequisites are a standard pre-calculus first course in probability and statistics, and a course in applied...
Tcl 8.5 Network Programming
Tcl 8.5 Network Programming

Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...

Learning Storm
Learning Storm

Create real-time stream processing applications with Apache Storm

About This Book

  • Integrate Storm with other Big Data technologies like Hadoop, HBase, and Apache Kafka
  • Explore log processing and machine learning using Storm
  • Step-by-step and easy-to-understand guide to...
Citrix XenDesktop 5.6 Cookbook
Citrix XenDesktop 5.6 Cookbook

The way people work is changing; users need to access their resources anywhere, on any device. Citrix XenDesktop gives you this flexibility. In this Cookbook, you will learn how Citrix XenDesktop 5.6 and related products are powerful and flexible enough for you to publish your resources - Desktops, Applications and contents - wherever and on...

Singularities of the Minimal Model Program (Cambridge Tracts in Mathematics)
Singularities of the Minimal Model Program (Cambridge Tracts in Mathematics)

This book gives a comprehensive treatment of the singularities that appear in the minimal model program and in the moduli problem for varieties. The study of these singularities and the development of Mori's program have been deeply intertwined. Early work on minimal models relied on detailed study of terminal and canonical singularities...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale

Highly available microservice-based web apps for Cloud with Java

Key Features

  • Take advantage of the simplicity of Spring to build a full-fledged application
  • Let your applications run faster while generating smaller cloud service bills
  • Integrate your...
Security Log Management: Identifying Patterns in the Chaos
Security Log Management: Identifying Patterns in the Chaos
Logs, logs, logs. Ever since I started taking my first steps in the world of security,
it has been clear that “the log” plays a crucial—and sometimes undervalued—
role in the security management of any IT infrastructure.This fact
alone explains the plethora of tools, applications, and solutions whose only
...
Splunk Essentials
Splunk Essentials

Leverage the power of Splunk to efficiently analyze machine, log, web, and social media data

About This Book

  • Make impressive reports and dashboards easily
  • Search, locate, and manage apps in Splunk
  • Use the Twitter app to create a dashboard based on Twitter searches of...
How to Value Your Business and Increase Its Potential
How to Value Your Business and Increase Its Potential
How to Value Your Business and Increase Its Potential takes the complex ideas of value and valuation and places them in terms that virtually all business owners can understand and profit from. Whether you are curious about the monetary value of the business you've created and built, or looking for little-known tips and techniques that will...
Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Macintosh Terminal Pocket Guide
Macintosh Terminal Pocket Guide

Unlock the secrets of the Terminal and discover how this powerful tool solves problems the Finder can’t handle. With this handy guide, you’ll learn commands for a variety of tasks, such as killing programs that refuse to quit, renaming a large batch of files in seconds, or running jobs in the background while you do other...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy