Home | Amazing | Today | Tags | Publishers | Years | Search 
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies.

Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book...

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Himalaya on the Threshold of Change (Advances in Global Change Research)
Himalaya on the Threshold of Change (Advances in Global Change Research)

This book provides a unique and comprehensive assessment of the changes that have been taking place in the Himalayas. It describes in detail all the aspects of change, both natural and cultural, along with their implications, and suggests policy measures to help mitigate them. The book is divided into two major sections – on...

Active Ageing and Labour Market Engagement: Evidence from Eastern India
Active Ageing and Labour Market Engagement: Evidence from Eastern India

The book provides an interesting analysis of the time-use data to examine the extent to which active ageing is occurring in India. It also synthesizes data from the National Sample Survey Office All India Survey and another survey undertaken in Kolkata, Bhubaneswar, and Ranchi (capital cities of East Indian states) to examine the...

Asianization of Migrant Workers in the Gulf Countries
Asianization of Migrant Workers in the Gulf Countries

This edited volume contains sixteen chapters by eminent scholars on one of the largest migration corridors in the world i.e., between South and South-East Asia and the Gulf region. Asia’s trade and cultural contact with the Gulf date back to ancient historical times. Since the 1970s, the economic rise of the Gulf Cooperation...

Reinforcement Learning of Bimanual Robot Skills (Springer Tracts in Advanced Robotics)
Reinforcement Learning of Bimanual Robot Skills (Springer Tracts in Advanced Robotics)

This book tackles all the stages and mechanisms involved in the learning of manipulation tasks by bimanual robots in unstructured settings, as it can be the task of folding clothes.

The first part describes how to build an integrated system, capable of properly handling the kinematics and dynamics of the robot along the...

Managing Security Threats along the EU’s Eastern Flanks (New Security Challenges)
Managing Security Threats along the EU’s Eastern Flanks (New Security Challenges)

The book addresses security threats and challenges to the European Union emanating from its eastern neighbourhood. The volume includes the expertise of policy and scholarly contributors coming from North America, Russia and Central Asia, and from across the EU. Themes and issues include the EU’s capacities and actorness,...

Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)
Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)

 This book seeks to contribute to prior research facing the discussion about public value creation in Smart Cities and the role of governments.  In the early 21st century, the rapid transition to a highly urbanized population has made societies and their governments around the world to be meeting unprecedented challenges...

Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)

This book presents the proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018), held on August 26-30, 2018, in Florence, Italy. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including...

Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy