Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.

In DevOps for Digital Leaders, deep collective experience on both...
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Streamline data analysis with an intuitive, visual Six Sigma strategy

Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...

Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts

Transform yourself into a specialist in DevOps adoption for Big Data on cloud

Key Features

  • Learn the concepts of Bigdata and Devops and Implement them
  • Get Acquainted with DevOps Frameworks Methodologies and Tools
  • A practical approach to build and work efficiently with your...
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools

Uncover the power of MySQL 8 for Big Data

About This Book

  • Combine the powers of MySQL and Hadoop to build a solid Big Data solution for your organization
  • Integrate MySQL with different NoSQL APIs and Big Data tools such as Apache Sqoop
  • A comprehensive guide with practical...
Game Development Patterns and Best Practices: Better games, less hassle
Game Development Patterns and Best Practices: Better games, less hassle

Utilize proven solutions to solve common problems in game development

About This Book

  • Untangle your game development workflow, make cleaner code, and create structurally solid games
  • Implement key programming patterns that will enable you to make efficient AI and remove duplication
  • ...
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
Elementary and Intermediate Algebra
Elementary and Intermediate Algebra

Algebra can be like a foreign language, but ELEMENTARY AND INTERMEDIATE ALGEBRA, 5E, gives you the tools and practice you need to fully understand the language of algebra and the "why" behind problem solving. Using Strategy and Why explanations in worked examples and a six-step problem solving strategy, ELEMENTARY AND INTERMEDIATE...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention

Turn unstructured data into valuable business insight

Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...

Java Performance Tuning
Java Performance Tuning
No matter what language they're programming in, developers always wish things would run faster! Especially when writing mission-critical applications, no one wants to be limited by the programming environment.
Java Performance Tuning provides all the details you need to know to "performance tune" any type of Java program
...
Result Page: 100 99 98 97 96 95 94 93 92 91 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy