Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Twitter Data Analytics (SpringerBriefs in Computer Science)
Twitter Data Analytics (SpringerBriefs in Computer Science)

This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter’s APIs and offers strategies for curating large datasets. The text gives examples of Twitter data with real-world examples, the present challenges and complexities of...

Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
The perfect study companion for UNIX system professionals preparing for both Solaris 8 System Administrator exams. The book contains accurate and efficient coverage of the many new features of the Solaris 8 system including new support for Ipv6, LDAP, and DHCP, installs using Solaris Web Start, new Universal Disk Format (UDF) file system support,...
Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Chess For Dummies
Chess For Dummies
It was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real...
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
Developing and Validating Rapid Assessment Instruments (Pocket Guides to Social Work Research Methods)
Developing and Validating Rapid Assessment Instruments (Pocket Guides to Social Work Research Methods)

Despite increases in their application and improvements in their structure, there is a paucity of reliable and valid scales compared to the complex range of problems that social workers and other health professionals confront daily. They need to be able to design rapid assessment instruments (RAIs) to fit their specific situations, and with this...

Software Architecture Knowledge Management: Theory and Practice
Software Architecture Knowledge Management: Theory and Practice

A software architecture manifests the major early design decisions, which determine the system’s development, deployment and evolution. Thus, making better architectural decisions is one of the large challenges in software engineering. Software architecture knowledge management is about capturing practical experience and translating it...

Robustness Development and Reliability Growth: Value Adding Strategies for New Products and Processes
Robustness Development and Reliability Growth: Value Adding Strategies for New Products and Processes

This book integrates key tools and processes into a comprehensive program for developing more robust and reliable technology-based products. Drawing on their extensive product development experience, the authors present a complete process for ensuring product performance throughout the entire lifecycle, from understanding...

Introduction to Search with Sphinx: From installation to relevance tuning
Introduction to Search with Sphinx: From installation to relevance tuning

I can’t quite believe it, but just 10 years ago there was no Google.

Other web search engines were around back then, such as AltaVista, HotBot, Inktomi, and AllTheWeb, among others. So the stunningly swift ascendance of Google can settle in my mind, given some effort. But what’s even more unbelievable is that...

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

Forensic CBT: A Handbook for Clinical Practice
Forensic CBT: A Handbook for Clinical Practice

Forensic CBT: A Handbook for Clinical Practice is an edited collection that represents the first authoritative resource on the utilization of CBT strategies and techniques for offender clients.

  • Features contributions from leaders of the major schools of CBT on the treatment of antisocial personality patterns as well...
unlimited object storage image
Result Page: 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy