Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)

This book presents a rich compilation of real-world cases on digitalization, the goal being to share first-hand insights from respected organizations and to make digitalization more tangible. As virtually every economic and societal sector is now being challenged by emerging technologies, the digital economy is a highly...

Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python
Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python

Leverage the features and libraries of Python to administrate your environment efficiently.

Key Features

  • Learn how to solve problems of system administrators and automate routine activities
  • Learn to handle regular expressions, network administration
  • ...
Introducing Maven: A Build Tool for Today's Java Developers
Introducing Maven: A Build Tool for Today's Java Developers

Gain an understanding of Maven’s dependency management and use it to organize basic and multi-module Maven projects. This short book is your quick-start tutorial for learning to use Maven. It includes inconsistently immutable collections, better array construction, and more from the latest Maven version 3.6. This second edition...

Functional Interfaces in Java: Fundamentals and Examples
Functional Interfaces in Java: Fundamentals and Examples
Reduce development time by organizing your programs as chains of functional interfaces and see that the advantages of using functional interfaces include the flexibility and power of inlined functional chains and reuse of functional methods utilized throughout the Java API. You’ll see how complex logical expressions can be reduced...
Afghanistan: A History from 1260 to the Present
Afghanistan: A History from 1260 to the Present
Located at the intersection of Asia and the Middle East, Afghanistan has been strategically important for thousands of years. Its ancient routes and strategic position between India, Inner Asia, China, Persia, and beyond has meant the region has been subject to frequent invasions, both peaceful and military. As a result, modern...
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence

Design, create and manage robust Power BI solutions to gain meaningful business insights

Key Features

  • Master all the dashboarding and reporting features of Microsoft Power BI
  • Combine data from multiple sources, create stunning visualizations and publish your reports across...
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Big Data Analysis with Python: Combine Spark and Python to unlock the powers of parallel computing and machine learning
Big Data Analysis with Python: Combine Spark and Python to unlock the powers of parallel computing and machine learning

Get to grips with processing large volumes of data and presenting it as engaging, interactive insights using Spark and Python.

Key Features

  • Get a hands-on, fast-paced introduction to the Python data science stack
  • Explore ways to create useful metrics and statistics from...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
Result Page: 84 83 82 81 80 79 78 77 76 75 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy