Practical Data Analysis
Transform, model, and visualize your data through hands-on projects, developed in open source tools
Explore how to analyze your data in various innovative ways and turn them into insight
Learn to use the D3.js visualization tool for exploratory data analysis
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...
CompTIA Security+ 2008 In Depth
Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...
The Internet: The Missing Manual
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?
This utterly current book...
Machine Learning and Security: Protecting Systems with Data and Algorithms
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...
The Book of Postfix: State-of-the-Art Message Transport Sendmail is the "King of the Hill" of the open source mail transport world, but Postfix is gaining steam. Wietse Venema, creator of TCP Wrapper and co-developer of TCT (The Coroner's Toolkit), wrote Postfix to create a faster and more secure mail transport application.
Setting up and maintaining any email server application is no walk...
Building a Monitoring Infrastructure with Nagios Build real-world, end-to-end network monitoring solutions with Nagios
This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David...
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.
If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...
|Result Page: 13 12 11 10 9 8 7 6 5 4 |