Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Streamline data analysis with an intuitive, visual Six Sigma strategy

Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...

UNIX and Linux System Administration Handbook (5th Edition)
UNIX and Linux System Administration Handbook (5th Edition)

UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.

 

...
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)

Modernize your IT skills for the new world of cloud computing!

Whether you are an IT administrator, developer, or architect, cloud technologies are transforming your role. This guide brings together the knowledge you need to transition smoothly to Microsoft Office 365 cloud-only and...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
With the evolution of our complex technological society and the introduction of new notions and innovative theoretical tools in the field of intelligent systems, the field of neural networks is undergoing an enormous evolution. These evolving and innovative theoretical tools are centered around the theory of soft computing, a theory that embodies...
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS

Leverage the capabilities of SAS to process and analyze Big Data

About This Book

  • Combine SAS with platforms such as Hadoop, SAP HANA, and Cloud Foundry-based platforms for effecient Big Data analytics
  • Learn how to use the web browser-based SAS Studio and iPython Jupyter Notebook...
DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

An Elementary Introduction to Statistical Learning Theory
An Elementary Introduction to Statistical Learning Theory

A thought-provoking look at statistical learning theory and its role in understanding human learning and inductive reasoning

A joint endeavor from leading researchers in the fields of philosophy and electrical engineering, An Elementary Introduction to Statistical Learning Theory is a comprehensive and accessible...

The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)
The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)

Create Thriving, High-Performing Teams and Organizations with Scrumban

 

Scrumban allows you to use Kanban as a catalyst for increasingly valuable changes to your existing software development processes, amplifying and expanding upon Scrum’s...

Result Page: 183 182 181 180 179 178 177 176 175 174 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy