Home | Amazing | Today | Tags | Publishers | Years | Search 
New Paradigm of Industry 4.0: Internet of Things, Big Data & Cyber Physical Systems (Studies in Big Data)
New Paradigm of Industry 4.0: Internet of Things, Big Data & Cyber Physical Systems (Studies in Big Data)

The book provides readers with an overview of the state of the art in the field of Industry 4.0 and related research advancements. The respective chapters identify and discuss new dimensions of both risk factors and success factors, along with performance metrics that can be employed in future research work. They also discuss a...

The Routledge Handbook of Urban Resilience (Routledge International Handbooks)
The Routledge Handbook of Urban Resilience (Routledge International Handbooks)

This volume provides a comprehensive discussion and overview of urban resilience, including socio-ecological and economic hazard and disaster resilience. It provides a summary of state of the art thinking on resilience, the different approaches, tools and methodologies for understanding the subject in urban contexts, and brings...

Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community...
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Discover the potential applications, challenges, and opportunities of deep learning from a business perspective with technical examples. These applications include image recognition, segmentation and annotation, video processing and annotation, voice recognition, intelligent personal assistants, automated translation, and...
SQL Server 2017 Query Performance Tuning: Troubleshoot and Optimize Query Performance
SQL Server 2017 Query Performance Tuning: Troubleshoot and Optimize Query Performance

Identify and fix causes of poor performance. You will learn Query Store, adaptive execution plans, and automated tuning on the Microsoft Azure SQL Database platform. Anyone responsible for writing or creating T-SQL queries will find valuable the insight into bottlenecks, including how to recognize them and eliminate them.

...

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Developing Data Migrations and Integrations with Salesforce: Patterns and Best Practices
Developing Data Migrations and Integrations with Salesforce: Patterns and Best Practices

Migrate your data to Salesforce and build low-maintenance and high-performing data integrations to get the most out of Salesforce and make it a "go-to" place for all your organization's customer information.

When companies choose to roll out Salesforce, users expect it to be the place to find any and all...

Write Your Way To Success: Lessons Learned on my Path from Ordinary Developer to Author of Programming Books That Sell
Write Your Way To Success: Lessons Learned on my Path from Ordinary Developer to Author of Programming Books That Sell

Learn how to make an impact in the web world. This short book shows you that the best way to become an expert and a thought leader is to thoroughly research a topic and then publish a book on it. 

The great thing about writing a book is that you don’t have to risk anything - all you need is a few hours of...

Genetics in Practice: A Clinical Approach for Healthcare Practitioners
Genetics in Practice: A Clinical Approach for Healthcare Practitioners

Nurses are increasingly being asked to provide information when a genetic diagnosis is made, whether to the individual patient or to members of his or her family. This book provides a comprehensive introduction to present day genetic services, to help professionals feel more confident when dealing with queries or advising where to go for...

Result Page: 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy