Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services
Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services
Build machine learning (ML) solutions for Java development. This book shows you that when designing ML apps, data is the key driver and must be considered throughout all phases of the project life cycle. Practical Java Machine Learning helps you understand the importance of data and how to organize it for use...
Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Get a 360-degree view of digital project management. Learn proven best practices from case studies and real-world scenarios. A variety of project management tools, templates, models, and frameworks are covered.

This book provides an in-depth view of digital project management from initiation to execution to monitoring and
...
Microsoft Tabular Modeling Cookbook
Microsoft Tabular Modeling Cookbook

No prior knowledgeof tabular modeling is needed to benefit from this brilliant cookbook. This is the total guide to developing and managing analytical models using the Business Intelligence Semantic Models technology.

Overview

  • Develop tabular models for personal use
  • Learn about the modeling...
Mastering Data Warehouse Aggregates: Solutions for Star Schema Performance
Mastering Data Warehouse Aggregates: Solutions for Star Schema Performance
The first book to offer in-depth coverage of star schema aggregate tables

 

Dubbed by Ralph Kimball as the most effective technique for maximizing star schema performance, dimensional aggregates are a powerful and efficient tool that can accelerate data warehouse queries more dramatically than any other technology. After you ensure...

Mastering SQL Server 2014 Data Mining
Mastering SQL Server 2014 Data Mining

Master selecting, applying, and deploying data mining models to build powerful predictive analysis frameworks

About This Book

  • Understand the different phases of data mining, along with the tools used at each stage
  • Explore the different data mining algorithms in depth
  • Become...
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code

Explore various verticals in software engineering through high-end systems using Python

Key Features

  • Master the tools and techniques used in software engineering
  • Evaluates available database options and selects one for the final Central Office system-components
  • ...
Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization
Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization

The comprehensive guide to planning and implementing your Cisco IP Telephony system, as shown by the experts.

  • Understand how to work through the different implementation phases of a Cisco IP telephony solution

  • Plan your implementation...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Modern Compiler Implementation in C
Modern Compiler Implementation in C

This new, expanded textbook describes all phases of a modern compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code...

Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)
Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)

This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology...

Result Page: 23 22 21 20 19 18 17 16 15 14 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy