Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies.

Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book...

MicroStrategy Quick Start Guide: Data analytics and visualizations for Business Intelligence
MicroStrategy Quick Start Guide: Data analytics and visualizations for Business Intelligence

Build reporting applications and dashboards using the different MicroStrategy objects

Key Features

  • Learn the fundamentals of MicroStrategy
  • Use MicroStrategy to get actionable insights from your business data
  • Create visualizations and build intuitive...
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition

A series of practical recipes to simplify the Git learning experience and increase your productivity when using Git version control

Key Features

  • Explore practical recipes to use Git's most advanced features
  • Learn how Git references its objects and how history is...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Hands-On Computer Vision with Julia: Build complex applications with advanced Julia packages for image processing, neural networks, and Artificial Intelligence
Hands-On Computer Vision with Julia: Build complex applications with advanced Julia packages for image processing, neural networks, and Artificial Intelligence

Explore the various packages in Julia that support image processing and build neural networks for video processing and object tracking.

Key Features

  • Build a full-fledged image processing application using JuliaImages
  • Perform basic to advanced image and video stream...
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python

With Hands-On Recommendation Systems with Python, learn the tools and techniques required in building various kinds of powerful recommendation systems (collaborative, knowledge and content based) and deploying them to the web

Key Features

  • Build industry-standard recommender systems
  • ...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
SQL Server Integration Services Design Patterns
SQL Server Integration Services Design Patterns

SQL Server Integration Services Design Patterns is newly-revised for SQL Server 2014, and is a book of recipes for SQL Server Integration Services (SSIS). Design patterns in the book help to solve common problems encountered when developing data integration solutions. The patterns and solution examples in the book increase your...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Adobe Muse: Classroom in a Book
Adobe Muse: Classroom in a Book

Those creative professionals seeking the fastest, easiest, most comprehensive way to learn Adobe Muse choose Adobe Muse Classroom in a Book from the Adobe Creative Team at Adobe Press. The 10 project-based lessons in this book show readers step-by-step the key techniques for working in Muse.

...

Enterprise Content and Search Management for Building Digital Platforms
Enterprise Content and Search Management for Building Digital Platforms

Provides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques

Contemporary business organizations can either embrace the digital revolution—or be left behind. Enterprise Content and Search Management for Building Digital...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy