Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence

Design, create and manage robust Power BI solutions to gain meaningful business insights

Key Features

  • Master all the dashboarding and reporting features of Microsoft Power BI
  • Combine data from multiple sources, create stunning visualizations and publish your reports across...
Network Intrusion Detection (3rd Edition)
Network Intrusion Detection (3rd Edition)

Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the...

Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare,...
A Comparative Study of Very Large Data Bases (Lecture Notes in Computer Science)
A Comparative Study of Very Large Data Bases (Lecture Notes in Computer Science)

This monograph presents a comparison of methods for organizing very large amounts of stored data called a very large database to facilitate fast retrieval of desired information on direct access storage devices. In a very large data base involving retrieval and updating, the major factor of immediate concern is the average number of accesses...

Incident Response: Computer Forensics Toolkit
Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer...

Combinatorial Search: From Algorithms to Systems
Combinatorial Search: From Algorithms to Systems

Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to...

The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
Analyzing Receiver Operating Characteristic Curves With SAS (Sas Press Series)
Analyzing Receiver Operating Characteristic Curves With SAS (Sas Press Series)
As a diagnostic decision-making tool, receiver operating characteristic (ROC) curves provide a comprehensive and visually attractive way to summarize the accuracy of predictions. They are extensively used in medical diagnosis and increasingly in fields such as data mining, credit scoring, weather forecasting, and psychometry. In this example-driven...
Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)
Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)

The second edition of Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today. The tip-of-the-spear technologies that are shaping the future are also addressed.

...
Semantics in Adaptive and Personalized Services: Methods, Tools and Applications (Studies in Computational Intelligence)
Semantics in Adaptive and Personalized Services: Methods, Tools and Applications (Studies in Computational Intelligence)

Semantics in Adaptive and Personalised Services, initially strikes one as a specific and perhaps narrow domain. Yet, a closer examination of the term reveals much more. On one hand there is the issue of semantics. Nowadays, this most often refers to the use of OWL, RDF or some other XML based ontology description language in order to...

Pollution Prevention through Process Integration: Systematic Design Tools
Pollution Prevention through Process Integration: Systematic Design Tools
Processing facilities are complex systems of unit operations and streams. Consequently, their environmental impact cannot be optimally mitigated by simple end-of-pipe measures. Instead, it is crucial to gain global insights into how mass flows throughout the process and to use these insights as a consistent basis for developing...
Chaotic Dynamics and Transport in Classical and Quantum Systems: Proceedings of the NATO Advanced Study Institute
Chaotic Dynamics and Transport in Classical and Quantum Systems: Proceedings of the NATO Advanced Study Institute
This book offers a modern updated review on the most important activities in today dynamical systems and statistical mechanics by some of the best experts in the domain. It gives a contemporary and pedagogical view on theories of classical and quantum chaos and complexity in hamiltonian and ergodic systems and their applications to anomalous...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy