Parallel and Concurrent Programming in HaskellIf you have a working knowledge of Haskell, this hands-on book shows you how to use the language's many APIs and frameworks for writing both parallel and concurrent programs. You'll learn how parallelism exploits multicore processors to speed up computation-heavy programs, and how concurrency enables you to write programs with threads for multiple interactions.
Author Simon Marlow walks you through the process with lots of code examples that you can run, experiment with, and extend. ...
Access 2007 VBA BibleLearn how to tap the full potential of Access 2007 Transfer Access data seamlessly between Microsoft Office applications - and that's just for starters. In this all-new, comprehensive guide by well-known Access expert Helen Feddema, you'll learn to write Visual Basic code that automates Access database tasks, creates standalone scripts, extracts and merges data, and allows you to put together powerful solutions. Whether you're a beginner or a power user, this is the book you need to succeed with Access 2007. ...
Developing Business Intelligence Apps for SharePointCreate dynamic business intelligence (BI) solutions for SharePoint faster and with more capabilities than previously possible. With this book, you'll learn the entire process - from high-level concepts to development and deployment - for building data-rich BI applications with Visual Studio LightSwitch, SQL Server 2012, and a host of related Microsoft technologies.
You'll learn practical techniques and patterns necessary to use all of these technologies together as you build an example application through the course of the book, step by step. Discover how to solve real problems, using BI solutions that will evolve to meet future needs. ...
Learning SPARQL, 2nd EditionGain hands-on experience with SPARQL, the RDF query language that's bringing new possibilities to semantic web, linked data, and big data projects. This updated and expanded edition shows you how to use SPARQL 1.1 with a variety of tools to retrieve, manipulate, and federate data from the public web as well as from private sources.
Author Bob DuCharme has you writing simple queries right away before providing background on how SPARQL fits into RDF technologies. Using short examples that you can run yourself with open source software, you'll learn how to update, add to, and delete data in RDF datasets. ...
Excel Dashboards and Reports, 2nd EditionUpdated for all the latest features and capabilities of Excel 2013, this go-to resource provides you with in-depth coverage of the individual functions and tools that can be used to create compelling Excel reports. Veteran author Michael Alexander walks you through the most effective ways to present and report data. Featuring a comprehensive review of a wide array of technical and analytical concepts, this essential guide helps you go from reporting data with simple tables full of dull numbers to presenting key information through the use of high-impact, meaningful reports and dashboards that will wow management both visually and substantively. ...
Zenoss Core Network and System MonitoringFor system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic. At some point it will be necessary to read the network traffic directly instead of monitoring application level details. Network security audits, debug network configurations, and usage patterns analyzing can all require network traffic monitoring. This task can be achieved by using network monitoring software, or network sniffers, that sniff the traffic and display it on your computer on the network.
Zenoss is an enterprise network and systems management application written in Python/Zope that provides an integrated product for monitoring availability, performance, events and configuration across layers and across platforms. ...
Security MetricsSecurity Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. ...
The Data Warehouse Toolkit, 3rd EditionThe first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative guides in this space. This new third edition is a complete library of updated dimensional modeling techniques, the most comprehensive collection ever. It covers new and enhanced star schema dimensional modeling patterns, adds two new chapters on ETL techniques, includes new and expanded business matrices for 12 case studies, and more. ...
Advanced Microsoft Content Management Server DevelopmentMicrosoft Content Management Server 2002 is a dynamic web publishing system with which you can build websites quickly and cost-efficiently. MCMS provides the administration, authoring, and data management functionality, and you provide the website interface, logic, and workflow. Microsoft SharePoint Portal Server (SPS) also features in the book. SPS 2003 enables enterprises to deploy an intelligent portal that seamlessly connects users, teams, and knowledge so that people can take advantage of relevant information across business processes to help them work more efficiently. ...
Computational Intelligence and Feature SelectionThe rough and fuzzy set approaches presented here open up many new frontiers for continued research and development.
Computational Intelligence and Feature Selection provides readers with the background and fundamental ideas behind Feature Selection (FS), with an emphasis on techniques based on rough and fuzzy sets. For readers who are less familiar with the subject, the book begins with an introduction to fuzzy set theory and fuzzy-rough set theory. ...