Tuesday Weld | The King's Woman | The Code
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Splunk Operational Intelligence Cookbook
Splunk Operational Intelligence Cookbook

Over 70 practical recipes to gain operational data intelligence with Splunk Enterprise

About This Book

  • Learn how to use Splunk to effectively gather, analyze, and report on the operational data across your environment
  • Expedite your operational intelligence reporting, be empowered to...
Business Intelligence Tools for Small Companies: A Guide to Free and Low-Cost Solutions
Business Intelligence Tools for Small Companies: A Guide to Free and Low-Cost Solutions

Learn how to transition from Excel-based business intelligence (BI) analysis to enterprise stacks of open-source BI tools. Select and implement the best free and freemium open-source BI tools for your company’s needs and design, implement, and integrate BI automation across the full stack using agile methodologies.

...

Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications

Gain a strong foundation of Arduino-based device development, from which you can go in any direction according to your specific development needs and desires. You'll build Arduino-powered devices for everyday use, and then connect those devices to the Internet. 

You'll be introduced to the building...

ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet  of Value
ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet of Value

The next generation internet, the Internet of Things, cannot work without an Internet of Value. The Internet of Value ― or ValueWeb, for short ― allows machines to trade with machines and people with people, anywhere on this planet in real-time and for free. The problem is that our old system cannot work that way, as it...

Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Nature Inspired Cooperative Strategies for Optimization (NICSO 2013): Learning, Optimization and Interdisciplinary Applications
Nature Inspired Cooperative Strategies for Optimization (NICSO 2013): Learning, Optimization and Interdisciplinary Applications

Biological and other natural processes have always been a source of inspiration for computer science and information technology. Many emerging problem solving techniques integrate advanced evolution and cooperation strategies, encompassing a range of spatio-temporal scales for visionary conceptualization of evolutionary computation.

...

Automated Data Analysis Using Excel
Automated Data Analysis Using Excel
Because the analysis of copious amounts of data and the preparation of custom reports often take away time from true research, the automation of these processes is paramount to ensure productivity. Exploring the core areas of automation, report generation, data acquisition, and data analysis, Automated Data Analysis Using Excel illustrates how to...
Ant Colony Optimization (Bradford Books)
Ant Colony Optimization (Bradford Books)

The complex social behaviors of ants have been much studied by science, and computer scientists are now finding that these behavior patterns can provide models for solving difficult combinatorial optimization problems. The attempt to develop algorithms inspired by one aspect of ant behavior, the ability to find what computer scientists would...

Concurrent Programming on Windows
Concurrent Programming on Windows

“When you begin using multi-threading throughout an application, the importance of clean architecture and design is critical. . . . This places an emphasis on understanding not only the platform’s capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory...

UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
C++ Primer
C++ Primer

Quite a few changes have occurred between the second and third editions of C++ Primer. Most notably, C++ has undergone international standardization, which has not only added new features to the language, such as exception handling, run-time type identification, namespaces, a built-in Boolean data type, and a new cast notation, but has...

The Object-Oriented Thought Process (3rd Edition) (Developer's Library)
The Object-Oriented Thought Process (3rd Edition) (Developer's Library)
The Object-Oriented Thought Process is a concise and readable primer. Matt Weisfeld's years of programming, teaching, and writing have given him a flair for presenting highly technical topics in a clear and interesting manner. He is able to blend abstract concepts with ingenious examples and clear illustrations to quickly teach powerful OOP...
Result Page: 53 52 51 50 49 48 47 46 45 44 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy