IT eBooks
Download, Read, Use
Azure Bot Service Succinctly
Azure Bot Service Succinctly

The power of artificial intelligence may be intimidating, but Microsoft provides the Bot Framework Composer to simplify the process of building conversational AI bots. Conversational bots are especially useful in serving different segments of a business, like customer support, sales, and administration. In this ebook, author Ed Freitas gets you up and running with your first conversational bot with minimal code and shows you how to publish it. From the foundation provided, you'll be able to start building your own bots to satisfy your unique needs. ...
Oracle Business Intelligence: The Condensed Guide to Analysis and Reporting
Oracle Business Intelligence: The Condensed Guide to Analysis and Reporting

Business Intelligence (BI) is the process of obtaining business information from available data and today, most businesses use BI to control their affairs. With Business Analysis and Reporting in Oracle Business Intelligence, you can quickly learn how to put the power of the Oracle Business Intelligence solutions to work. To jump start with analysis and reporting of data on an Oracle Business Intelligence SE platform and to keep the process of learning simple and interesting requires numerous annotated examples. ...
IBM Cognos Business Intelligence
IBM Cognos Business Intelligence

IBM Cognos is Business Intelligence software that enables businesses to fully utilize their maximum potential. It connects people with information from virtually any data source whenever and wherever they need it so that they can make better decisions, faster. Take the practical, hands-on approach to managing your reporting environment with IBM Cognos Business Intelligence - packed with coverage of all the latest features to truly help you maximize your potential. ...
Splunk Operational Intelligence Cookbook
Splunk Operational Intelligence Cookbook

This book contains over 70 practical, task-oriented recipes to build up your knowledge of Splunk's many features which you can apply to real-world operational intelligence scenarios. Right from the first chapter, you will follow recipes that progressively build upon one another. The recipes provided will demonstrate methods to expedite delivery of intelligence reports and empower you to present data in a meaningful way through dashboards and by applying visualizations available in Splunk Enterprise. You will also delve deeply into your data with transactions, subsearching, concurrency, and more advanced search commands. ...
Intelligence-Driven Incident Response
Intelligence-Driven Incident Response

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process. Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship. In three parts, this in-depth book includes:The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response proc ...
Open Source Intelligence Methods and Tools
Open Source Intelligence Methods and Tools

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware o ...
Programming Collective Intelligence
Programming Collective Intelligence

Want to tap the power behind search rankings, product recommendations, social bookmarking, and online matchmaking? This fascinating book demonstrates how you can build Web 2.0 applications to mine the enormous amount of data created by people on the Internet. With the sophisticated algorithms in this book, you can write smart programs to access interesting datasets from other web sites, collect data from users of your own applications, and analyze and understand the data once you've found it. Programming Collective Intelligence takes you into the world of machine learning and statistics, and explains how to draw conclusions about user experience, marketing, personal tastes, and human behavior in general - all from information that you and others collect every day. Each algorithm is described clearly and concisely with code that can immediately be used on your web site, blog, Wiki, or specialized application. ...
SharePoint 2010 Business Intelligence 24-Hour Trainer
SharePoint 2010 Business Intelligence 24-Hour Trainer

Written by a team of leading SharePoint and Business Intelligence (BI) experts, this unique book package shows you how to successfully build and deliver BI applications using SharePoint 2010. Assuming no previous SharePoint experience, the authors deliver a clear explanation of what SharePoint will do for your BI and information management capabilities. As you learn best practices for configuring and securing SharePoint 2010 BI applications and planning and implementing your SharePoint BI project plan, you'll be well on your way to gaining a solid foundation of understanding and working with SharePoint 2010 and BI. ...
Decision Support Systems for Business Intelligence, 2nd Edition
Decision Support Systems for Business Intelligence, 2nd Edition

Computer-based systems known as decision support systems (DSS) play a vital role in helping professionals across various fields of practice understand what information is needed, when it is needed, and in what form in order to make smart and valuable business decisions. Providing a unique combination of theory, applications, and technology, Decision Support Systems for Business Intelligence, Second Edition supplies readers with the hands-on approach that is needed to understand the implications of theory to DSS design as well as the skills needed to construct a DSS. ...
Computational Intelligence and Pattern Analysis in Biology Informatics
Computational Intelligence and Pattern Analysis in Biology Informatics

This book synthesizes current research in the integration of computational intelligence and pattern analysis techniques, either individually or in a hybridized manner. The purpose is to analyze biological data and enable extraction of more meaningful information and insight from it. Biological data for analysis include sequence data, secondary and tertiary structure data, and microarray data. These data types are complex and advanced methods are required, including the use of domain-specific knowledge for reducing search space, dealing with uncertainty, partial truth and imprecision, efficient linear and/or sub-linear scalability, incremental approaches to knowledge discovery, and increased level and intelligence of interactivity with human experts and decision makers. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025