Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro SQL Server 2012 Administration (Professional Apress)
Pro SQL Server 2012 Administration (Professional Apress)

Pro SQL Server 2012 Administration is a one-stop source for all the knowledge you'll need to professionally manage a database under Microsoft SQL Server 2012. SQL Server administration is a complex field requiring an unusually broad and well-rounded skill set. A good database administrator must be part system...

The Internet of Things: Key Applications and Protocols
The Internet of Things: Key Applications and Protocols

An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use...

Bayesian Data Analysis, Second Edition (Chapman & Hall/CRC Texts in Statistical Science)
Bayesian Data Analysis, Second Edition (Chapman & Hall/CRC Texts in Statistical Science)
This book is intended to have three roles and to serve three associated audiences: an introductory text on Bayesian inference star ting from first principles, a graduate text on effective current approaches to Bayesian modeling and computation in statistics and related fields, and a handbook of Bayesian meth ods in applied...
SAP NetWeaver Business Warehouse: Administration and Monitoring
SAP NetWeaver Business Warehouse: Administration and Monitoring

This book offers a complete understanding of all administration tasks that arise in a live SAP NetWeaver BW system and provides guidance on ways to solve any problems that might occur. Coverage includes all topics relevant to administration and monitoring of SAP NetWeaver BW, including basic principles, tasks, analysis, and...

Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Our primary aim is to introduce the render to a wide range of numerical algorithms, explain their fundamental principles and illustrate their application. The algorithms are implemented in the software package МАТ1.ЛН® because it provides a powerful tool to help with these studies.

Many
...
High Performance MySQL: Optimization, Backups, and Replication
High Performance MySQL: Optimization, Backups, and Replication
We wrote this book to serve the needs of not just the MySQL application developer but also the MySQL database administrator. We assume that you are already relatively experienced with MySQL. We also assume some experience with general system administration, networking, and Unix-like operating systems.

The second edition of
...
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide
Hadoop got its start in Nutch. A few of us were attempting to build an open source web search engine and having trouble managing computations running on even a handful of computers. Once Google published its GFS and MapReduce papers, the route became clear. They’d devised systems to solve precisely the...
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
Data Structures and Algorithm Analysis in Java (3rd Edition)
Data Structures and Algorithm Analysis in Java (3rd Edition)

This new Java edition describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more...

OSGi and Equinox: Creating Highly Modular Java Systems
OSGi and Equinox: Creating Highly Modular Java Systems

A Hands-On Guide to Equinox and the OSGi Framework

 In OSGI and Equinox: Creating Highly Modular Java™ Systems, three leading experts show developers--for the first time--exactly how to make the most of these breakthrough technologies for building highly modular dynamic systems.

...

Microsoft SharePoint for Business Executives: Q&A Handbook
Microsoft SharePoint for Business Executives: Q&A Handbook
There are many approaches to starting a SharePoint project.

In my experience all the big ones start with a team of people presenting this bright perfect future with them leading us. They are going to solve all your existing issues and then hold your hand into the future. You listen closely to the advice of the
...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Result Page: 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy