IT eBooks
Download, Read, Use

Wiley

Android Phones For Dummies, 2nd Edition
Android Phones For Dummies, 2nd Edition

The popularity of Android phones is simply exploding, so it's a perfect time for popular For Dummies author Dan Gookin to update his bestselling guide to all things Android phones. From setup and configuration to taking advantage of the latest amazing Android features, this practical resource is designed to make new Android users comfortable and to help veterans get the most out of their Android phone. Covering features that are common to the most popular Android phones, this book walks you through the basics of making calls, using the touchscreen, sending e-mails and texts, browsing the Internet, using the camera, staying in touch with social media, and so much more. ...
Advanced Backend Optimization
Advanced Backend Optimization

This book is a summary of more than a decade of research in the area of backend optimization. It contains the latest fundamental research results in this field. While existing books are often more oriented toward Masters students, this book is aimed more towards professors and researchers as it contains more advanced subjects. It is unique in the sense that it contains information that has not previously been covered by other books in the field, with chapters on phase ordering in optimizing compilation; register saturation in instruction level parallelism; code size reduction for software pipelining; memory hierarchy effects and instruction level parallelism. Other chapters provide the latest research results in well-known topics such as register need, and software pipelining and periodic register allocation. ...
SPSS Statistics for Dummies, 3rd Edition
SPSS Statistics for Dummies, 3rd Edition

The ultimate beginner's guide to SPSS and statistical analysis SPSS Statistics For Dummies is the fun and friendly guide to mastering SPSS. This book contains everything you need to know to get up and running quickly with this industry-leading software, with clear, helpful guidance on working with both the software and your data. Every chapter of this new edition has been updated with screenshots and steps that align with SPSS 23.0. You'll learn how to set up the software and organize your workflow, then delve deep into analysis to discover the power of SPSS capabilities. You'll discover the mechanics behind the calculations, perform predictive analysis, produce informative graphs, and maximize your data, even if it's been awhile since your last statistics class. SPSS is the leading statistical software for social sciences, marketing, health care, demography, government, education, data mining, and more. This powerful package gives you the tools you need to get more out of your data, a ...
Software Networks
Software Networks

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network. In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource. We will show how this architecture is compatible with new advances in SDN, new high-speed transport protocol like TRILL and LISP, NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Interne ...
Security Intelligence
Security Intelligence

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. ...
Programmable Logic Controllers
Programmable Logic Controllers

Widely used across industrial and manufacturing automation, Programmable Logic Controllers (PLCs) perform a broad range of electromechanical tasks with multiple input and output arrangements, designed specifically to cope in severe environmental conditions such as automotive and chemical plants. Programmable Logic Controllers: A Practical Approach using CoDeSys is a hands-on guide to rapidly gain proficiency in the development and operation of PLCs based on the IEC 61131-3 standard. Using the freely-available* software tool CoDeSys, which is widely used in industrial design automation projects, the author takes a highly practical approach to PLC design using real-world examples. The design tool, CoDeSys, also features a built in simulator / soft PLC enabling the reader to undertake exercises and test the examples. ...
NoSQL For Dummies
NoSQL For Dummies

This easy to read guide to NoSQL databases provides the type of no-nonsense overview and analysis that you need to learn, including what NoSQL is and which database is right for you. Featuring specific evaluation criteria for NoSQL databases, along with a look into the pros and cons of the most popular options, NoSQL For Dummies provides the fastest and easiest way to dive into the details of this incredible technology. You'll gain an understanding of how to use NoSQL databases for mission-critical enterprise architectures and projects, and real-world examples reinforce the primary points to create an action-oriented resource for IT pros. If you're planning a big data project or platform, you probably already know you need to select a NoSQL database to complete your architecture. But with options flooding the market and updates and add-ons coming at a rapid pace, determining what you require now, and in the future, can be a tall task. This is where NoSQL For Dummies comes in! ...
Network Attacks and Exploitation
Network Attacks and Exploitation

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to ...
Large-scale Distributed Systems and Energy Efficiency
Large-scale Distributed Systems and Energy Efficiency

With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green networking (both wired and wireless), mobile computing, power modeling, the rise of green data centers and high-performance computing, resource allocation, and energy efficiency in peer-to-peer (P2P) computing networks. ...
Graph Analysis and Visualization
Graph Analysis and Visualization

Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the discovery of new business insights and opportunities. Published in full color, the book describes the process of creating powerful visualizations using a rich and engaging set of examples from sports, finance, marketing, security, social media, and more. You will find practical guidance toward pattern identification and using various data sources, including Big Data, plus clear instruction on the use of software and programming. The companion website offers data sets, full code examples in Python, and links to all the tools covered in the book. Science has already reaped the benefit of network and graph theory, which has powered breakthroughs in physics, economics, genetics, and more. This book brings those proven techniques into the worl ...
Getting an Information Security Job For Dummies
Getting an Information Security Job For Dummies

Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition and launch yourself into your dream job as an Information Security (IS) guru. Inside, you'll discover the fascinating history, projected future, and current applications/issues in the IS field. Next, you'll get up to speed on the general educational concepts you'll be exposed to while earning your analyst certification and the technical requirements for obtaining an IS position. Finally, learn how to set yourself up for job hunting success with trusted and supportive guidance on creating a winning resume, gaining attention with your cover letter, following up after an initial interview, ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2024