Real-time analytics is the hottest topic in data analytics today. In Real-Time Analytics - expert Byron Ellis teaches data analysts technologies to build an effective real-time analytics platform. This platform can then be used to make sense of the constantly changing data that is beginning to outpace traditional batch-based analysis platforms.
The author is among a very few leading experts in the field. He has a prestigious background in research, development, analytics, real-time visualization, and Big Data streaming and is uniquely qualified to help you explore this revolutionary field. Moving from a description of the overall analytic architecture of real-time analytics to using specific tools to obtain targeted results, Real-Time Analytics leverages open source and modern commercial tools to construct robust, efficient systems that can provide real-time analysis in a cost-effective manner.
Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast! is the comprehensive guide to achieving the dream that business intelligence practitioners have been chasing since the concept itself came into being. Written by an IT visionary with extensive global supply chain experience and insight, this book describes what happens when team members have accurate, reliable, usable, and timely information at their fingertips. With a focus on leveraging big data, the book provides expert guidance on developing an analytical ecosystem to effectively manage, use the internal and external information to deliver business results.
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information.
||Basic Guide to System Safety, 3rd Edition|
This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery, substances, and work processes including their construction, manufacture, use, maintenance, and ultimate disposal or reuse. These techniques provide guidance for a life-cycle assessment and design model that balances environmental and occupational safety and health goals over the life span of a facility, process, or product.
||The Art of Memory Forensics|
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident response fields.
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly.
||Internet, Phone, Mail, and Mixed-Mode Surveys, 4th Edition|
For over two decades, Dillman's classic text on survey design has aided both students and professionals in effectively planning and conducting mail, telephone, and, more recently, Internet surveys. The new edition is thoroughly updated and revised, and covers all aspects of survey research. It features expanded coverage of mobile phones, tablets, and the use of do-it-yourself surveys, and Dillman's unique Tailored Design Method is also thoroughly explained. This invaluable resource is crucial for any researcher seeking to increase response rates and obtain high-quality feedback from survey questions. Consistent with current emphasis on the visual and aural, the new edition is complemented by copious examples within the text and accompanying website.
||Engineering Innovative Products|
Engineering Innovative Products: A Practical Experience is a pioneering book that will be of key use to senior undergraduate and graduate engineering students who are being encouraged to explore innovation and commercialization as part of their courses. The book will teach the essential skills of entrepreneurship and address the fundamental requirements needed to establish a successful technology company.
As well as providing the crucial background and insights enabling students to identify a key market, it also offers a highly practical guide to undertaking genuine product validation and producing a feasibility study, as well as providing vital insights into the challenges and demands in forming a technology based company.
||MATLAB, 5th Edition|
More college students use Amos Gilat's MATLAB: An Introduction with Applications than any other MATLAB textbook. This concise book is known for its just-in-time learning approach that gives students information when they need it. The new edition gradually presents the latest MATLAB functionality in detail. Equally effective as a freshmen-level text, self-study tool, or course reference, the book is generously illustrated through computer screen shots and step-by-step tutorials, with abundant and motivating applications to problems in mathematics, science, and engineering.
||An Introduction to LTE, 2nd Edition|
Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe. The book assumes no more than a basic knowledge of mobile telecommunication systems, and the reader is not expected to have any previous knowledge of the complex mathematical operations that underpin LTE.
||Design, Deployment and Performance of 4G-LTE Networks|
Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book focuses on the end-to-end aspects of the LTE network architecture and different deployment scenarios of commercial LTE networks. It describes the air interface of LTE focusing on the access stratum protocol layers: PDCP, RLC, MAC, and Physical Layer. The air interface described in this book covers the concepts of LTE frame structure, downlink and uplink scheduling, and detailed illustrations of the data flow across the protocol layers. It describes the details of the optimization process including performance measurements and troubleshooting mechanisms in addition to demonstrating common issues and case studies based on actual field results. The book provides detailed performance analysis of key features/enhancements such as C-DRX for Smartphones battery saving, CSFB solution to support voice calls with LTE, and MIMO techniques.
||Webinars For Dummies|
Webinars For Dummies takes the guesswork and uncertainty out of webinar creation. Written by John Carucci under the guidance of webinar technology company ON24, the book provides a roadmap for creating a webinar that effectively communicates to the audience without boring them to sleep. Webinars For Dummies gives you the insider's perspective on techniques that have been proven effective time and again.
Webinars are becoming increasingly common as a way for businesses to connect with customers and partners without distance being a factor. Whether they take the form of a live presentation, a PowerPoint slideshow, or a combination of both, the beauty of the webinar is that it can be archived and viewed again after the initial set presentation. But this feature also adds a burden to the webinar creator, as the presentation must be understood outside of the live context. Creating what is essentially an archival presentation means considering a host of factors surrounding both content and organization.