Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big Data Visualization
Big Data Visualization
Learn effective tools and techniques to separate big data into manageable and logical components for efficient data visualization About This Book This unique guide teaches you how to visualize your cluttered, huge amounts of big data with ease It is rich with ample options and solid use cases for big data visualization, and is a must-have book...
Excel Functions and Formulas Pocketbook
Excel Functions and Formulas Pocketbook
Geared toward the intermediate to advanced Excel 2016 user, this pocketbook provides explanations and context for many powerful Excel 2016 spreadsheet formulas and functions. Step-by-step instructions for many formula/function-related features such as using range names, and Excel's troubleshooting features. Focus on clarity, accuracy,...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
Sampling Algorithms (Springer Series in Statistics)
Sampling Algorithms (Springer Series in Statistics)
This book is based upon courses on sampling algorithms. After having used scattered notes for several years, I have decided to completely rewrite the material in a consistent way. The books of Brewer and Hanif (1983) and H´ajek (1981) have been my works of reference. Brewer and Hanif (1983) have drawn up an...
Circuits, Systems and Signal Processing: A Tutorials Approach
Circuits, Systems and Signal Processing: A Tutorials Approach

This book is a collection of tutorial-like chapters on all core topics of signals and systems and the electronic circuits. All the topics dealt with in the book are parts of the core syllabi of standard programs in Electrical Engineering, Electrical and Computer Engineering, and Electronics and Telecommunication Engineering domains. This book...

Internet of Things Programming with JavaScript
Internet of Things Programming with JavaScript
The Raspberry Pi Zero is a powerful, low-cost, credit-card sized computer, which lends itself perfectly to begin the controller of sophisticated home automation devices. Using the available on-board interfaces, the Raspberry Pi Zero can be expanded to allow the connection of a virtually infinite number of security sensors and...
Docker in Practice
Docker in Practice

Summary

An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.

About...

C# 7.0 All-in-One For Dummies
C# 7.0 All-in-One For Dummies

Sharpen your knowledge of C#

C# know-how is a must if you want to be a professional Microsoft developer. It's also good to know a little C# if you're building tools for the web, mobile apps, or other development tasks. C# 7.0 All-in-One For Dummies offers a deep dive into C# for coders still learning the...

The Calculus of Computation: Decision Procedures with Applications to Verification
The Calculus of Computation: Decision Procedures with Applications to Verification
Computational logic is a fast-growing field with applications in artificial intelligence, constraint solving, and the design and verification of software and hardware systems. Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art...
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS

Leverage the capabilities of SAS to process and analyze Big Data

About This Book

  • Combine SAS with platforms such as Hadoop, SAP HANA, and Cloud Foundry-based platforms for effecient Big Data analytics
  • Learn how to use the web browser-based SAS Studio and iPython Jupyter Notebook...
Result Page: 208 207 206 205 204 203 202 201 200 199 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy