Home | Amazing | Today | Tags | Publishers | Years | Search 
MySQL to DB2 Conversion Guide
MySQL to DB2 Conversion Guide

Switching database vendors is often considered an exhausting challenge for database administrators and developers. Complexity, total cost, and the risk of downtime are often the reasons that restrain IT decision makers from starting the migration project. The primary goal of this book is to show that, with the proper planning and...

Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Using SAS Enterprise Miner, Barry de Ville's Decision Trees for Business Intelligence and Data Mining illustrates the application and operation of decision trees in business intelligence, data mining, business analytics, prediction, and knowledge discovery. It explains in detail the use of decision trees as a data mining technique and...
Cloud Native Development Patterns and Best Practices: Practical architectural patterns for building modern, distributed cloud-native systems
Cloud Native Development Patterns and Best Practices: Practical architectural patterns for building modern, distributed cloud-native systems

Learn to apply cloud-native patterns and practices to deliver responsive, resilient and message-driven systems with confidence

Key Features

  • Understand the architectural patterns involved in cloud-native architectures
  • Minimize risk by evolving your monolithic applications...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
New Paradigm of Industry 4.0: Internet of Things, Big Data & Cyber Physical Systems (Studies in Big Data)
New Paradigm of Industry 4.0: Internet of Things, Big Data & Cyber Physical Systems (Studies in Big Data)

The book provides readers with an overview of the state of the art in the field of Industry 4.0 and related research advancements. The respective chapters identify and discuss new dimensions of both risk factors and success factors, along with performance metrics that can be employed in future research work. They also discuss a...

The Routledge Handbook of Urban Resilience (Routledge International Handbooks)
The Routledge Handbook of Urban Resilience (Routledge International Handbooks)

This volume provides a comprehensive discussion and overview of urban resilience, including socio-ecological and economic hazard and disaster resilience. It provides a summary of state of the art thinking on resilience, the different approaches, tools and methodologies for understanding the subject in urban contexts, and brings...

Introduction to Statistical Decision Theory: Utility Theory and Causal Analysis
Introduction to Statistical Decision Theory: Utility Theory and Causal Analysis

Introduction to Statistical Decision Theory: Utility Theory and Causal Analysis provides the theoretical background to approach decision theory from a statistical perspective. It covers both traditional approaches, in terms of value theory and expected utility theory, and recent developments, in terms of causal...

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community...
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy