Home | Amazing | Today | Tags | Publishers | Years | Search 
Big Data Analytics Using Splunk: Deriving Operational Intelligence from Social Media, Machine Data, Existing Data Warehouses, and Other Real-Time Streaming Sources
Big Data Analytics Using Splunk: Deriving Operational Intelligence from Social Media, Machine Data, Existing Data Warehouses, and Other Real-Time Streaming Sources

Big Data Analytics Using Splunk is a hands-on book showing how to process and derive business value from big data in real time. Examples in the book draw from social media sources such as Twitter (tweets) and Foursquare (check-ins). You also learn to draw from machine data, enabling you to analyze, say, web server log files and...

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Functional Programming: Practice and Theory
Functional Programming: Practice and Theory
There is more to functional programming than simply programming in a functional language. As explained in Section 1.1,1 view functional pro gramming as a new programming paradigm, comparable in importance to structured programming. As such, it has value as a discipline of thought even in the absence of functional programming...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Advanced Joomla!
Advanced Joomla!

Advanced Joomla! teaches you advanced techniques for customizing a Joomla! CMS, including creating templates, administration, and building extensions. It will provide the technical know-how and a bonanza of information that will allow you to take your Joomla! sites to the next level.

Written by bestselling
...

Noise Reduction in Speech Processing (Springer Topics in Signal Processing)
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)

Noise is everywhere and in most applications that are related to audio and speech, such as human-machine interfaces, hands-free communications, voice over IP (VoIP), hearing aids, teleconferencing/telepresence/telecollaboration systems, and so many others, the signal of interest (usually speech) that is picked up by a microphone is generally...

A History of Computing Technology, 2nd Edition
A History of Computing Technology, 2nd Edition

This second edition of the popular reference and textbook outlines the historical developments in computing technology. The book describes historical aspects of calculation and concentrates on the physical devices used to aid people in their attempts at automating the arithmetic process.

A History of Computing Technology...

Encyclopedia of Electronic Circuits, Vol. 3
Encyclopedia of Electronic Circuits, Vol. 3

This book presents a giant collection of the latest, most widely-used electronic circuits - an invaluable reference tool! "The Encyclopedia of Electronic Circuits" is back! Not a revision of the past two volumes, this third edition in the bestselling series offers you hundreds of schematics for the latest electronics circuits from...

SAS Storage Architecture: Serial Attached SCSI
SAS Storage Architecture: Serial Attached SCSI
The SAS Storage Architecture book is intended as a tutorial and to serve as classroom materials for the training MindShare delivers on this subject. It should be considered a companion to the SAS standard, helping to clarify and explain the concepts and provide the motivation for decisions that were made in the creation of the...
VHDL for Logic Synthesis
VHDL for Logic Synthesis

Making VHDL a simple and easy-to-use hardware description language

Many engineers encountering VHDL (very high speed integrated circuits hardware description language) for the first time can feel overwhelmed by it. This book bridges the gap between the VHDL language and the hardware that results from logic synthesis with...

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...

Result Page: 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 419 418 417 416 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy