Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Processing and Managing Complex Data for Decision Support
Processing and Managing Complex Data for Decision Support
In many decision support fields the data that is exploited tends to be more and more complex. To take this phenomenon into account, classical architectures of data warehouses or data mining algorithms must be completely re-evaluated.

Processing and Managing Complex Data for Decision Support provides readers with an overview of the emerging...

Multidimensional Databases: Problems and Solutions
Multidimensional Databases: Problems and Solutions

The term "multidimensional data" generally refers to data in which a given fact is quantified by a set of measures, obtained by applying one more or less complex aggregative function (from count or sum to average or percent, and so on) to raw data. Such measures are...

Nothing to Hide: The False Tradeoff between Privacy and Security
Nothing to Hide: The False Tradeoff between Privacy and Security

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to...

HIV and AIDS:: Basic Elements and Priorities
HIV and AIDS:: Basic Elements and Priorities

HIV and Aids: Basic Elements and Priorities is a concise collection of all aspects of this disease and a source of readily available knowledge. It examines all currently advocated preventive measures such as health education, condom use, safer sex practices, and treatment of sexually transmitted infections. Coverage details strategies for...

RHCE Red Hat Certified Engineer Linux: 100 Success Secrets on RHCE Linux Test Preparation, Study Guides, Practice Exams, Braindumps, Certification Exam
RHCE Red Hat Certified Engineer Linux: 100 Success Secrets on RHCE Linux Test Preparation, Study Guides, Practice Exams, Braindumps, Certification Exam
Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an individual's ability to configure networking services and security on servers running a Red Hat OS.

The rise of Red Hat has been marvelous to watch. Starting...

Mind Over Markets: Power Trading with Market Generated Information, Updated Edition
Mind Over Markets: Power Trading with Market Generated Information, Updated Edition

A timely update to the book on using the Market Profile method to trade

Emerging over twenty years ago, Market Profile analysis continues to realize a strong following among active traders. The approach explains the underlying dynamics and structure of markets, identifies value areas, price rejection points, and...

CCIE® Practical Studies, Volume I
CCIE® Practical Studies, Volume I

Cisco Certified Internetwork Expert (CCIE) certification is the most difficult and most rewarding of the Cisco(r) certifications. Although the professional and financial benefits of a CCIE are excellent, attaining this level of certification takes years of experience, study, and effort. Serving a dual role of networking...

How to Cheat at Securing SQL Server 2005
How to Cheat at Securing SQL Server 2005
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005.

SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to
...
Learning Einstein Analytics: Unlock critical insights with Salesforce  Einstein Analytics
Learning Einstein Analytics: Unlock critical insights with Salesforce Einstein Analytics

Learn to confidently setup and create app, lenses, dashboards using Salesforce Einstein Analytics.

Key Features

  • Explore Einstein analytics on desktop as well as mobile platforms
  • Turn data into smarter sales with Einstein Analytics for Sales
  • Visualize your data with...
How to Cheat at IIS 7 Server Administration
How to Cheat at IIS 7 Server Administration
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of...
Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011
Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011

PAKDD has been recognized as a major international conference in the areas of data mining (DM) and knowledge discovery in databases (KDD). It provides an international forum for researchers and industry practitioners to share their new ideas, original research results and practical development experiences from all KDD-related areas...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy