Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems
A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems

The recent remarkable developments of interior point algorithms began in 1984 with Karmarkar's polynomial-time interior point algorithm for linear programs using a log- arithmic potential function and a projective transformation. The progress has been made so rapidly and extensively that it seems difficult to get a comprehensive...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

HTML5 Guidelines for Web Developers
HTML5 Guidelines for Web Developers

In 2010, HTML5 became the buzzword on the web developer scene. Large companies, such as Google, Apple, and Microsoft, began to use the new technology. The popularity of the catchword HTML5 grew, not least of all because of the heated debate between Apple and Adobe over whether this would mean the end of Flash.

In this book,...

Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification

The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical...

Python Web Development with Django
Python Web Development with Django

Using the simple, robust, Python-based Django framework, you can build powerful Web solutions with remarkably few lines of code. In Python Web Development with Django®, three experienced Django and Python developers cover all the techniques, tools, and concepts you need to make the most of Django 1.0, including all the major...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion—or also simply called OS X Lion—is the latest version of the computer operating system that put the phrase graphic user interface in everyone’s vocabulary. With Mac OS, you can point, click, and drag to work with files, applications, and utilities. Because the same intuitive interface...
802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
Drush User's Guide
Drush User's Guide

Drush is a command line interface for Drupal. Most of the tasks for building and maintaining a website are repetitive and involve filling in forms on administration pages. The majority of these tasks can be achieved with a single Drush command, drastically shortening the development and maintenance time of a project.

Drupal...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy