 |
|
|
|
 Hadoop Real World Solutions Cookbook - Second Edition
Key Features
-
Implement outstanding Machine Learning use cases on your own analytics models and processes.
-
Solutions to common problems when working with the Hadoop ecosystem.
-
Step-by-step implementation of end-to-end big data use cases.
Who This Book Is For
... |  |  Governance, Risk, and Compliance Handbook for Oracle Applications
-
Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
-
Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
... |  |  Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... |
|
|
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |