IT eBooks
Download, Read, Use
Data Mining Algorithms
Data Mining Algorithms

Data Mining Algorithms is a practical, technically-oriented guide to data mining algorithms that covers the most important algorithms for building classification, regression, and clustering models, as well as techniques used for attribute selection and transformation, model quality evaluation, and creating model ensembles. The author presents many of the important topics and methodologies widely used in data mining, whilst demonstrating the internal operation and usage of data mining algorithms using examples in R. ...
Mathematical Game Theory and Applications
Mathematical Game Theory and Applications

An authoritative and quantitative approach to modern game theory with applications from diverse areas including economics, political science, military science, and finance. Explores areas which are not covered in current game theory texts, including a thorough examination of zero-sum game; Provides introductory material to game theory, including bargaining, parlour games, sport, networking games and dynamic games; Explores Bargaining models, discussing new result such as resource distributions, buyer-seller instructions and reputation in bargaining models; Theoretical results are presented along with numerous examples and detailed solutions at the end of each chapter; Presents a good balance of both theoretical foundations and complex applications of game theory. ...
Data Center Handbook
Data Center Handbook

Data Center Handbook provides the fundamentals, technologies, and best practices in designing, constructing and managing mission critical, energy efficient data centers. The most comprehensive single source guide ever published in this field, with 36 chapters and over 350 illustrations written by 50 world class authors; Offers disaster management techniques and lessons learned from 2011 earthquake and tsunami in Japan, and 2012 Superstorm Sandy; Discusses international standards and requirements, with contributions from experts in the United States, Canada, United Kingdom, France, Sweden, Japan, Korea, and China. ...
Creating your MySQL Database
Creating your MySQL Database

For most of us, setting up the database for an application is often an afterthought. While you don't need to be a professional database designer to create a working application, knowing a few insider tips and techniques can make both the process easier and the end result much more effective. This book doesn't set out to make you an expert in data analysis, but it does provide a quick and easy way to raise your game in this essential part of getting your application right. ...
Python in Practice
Python in Practice

If you're an experienced Python programmer, Python in Practice will help you improve the quality, reliability, speed, maintainability, and usability of all your Python programs. Mark Summerfield focuses on four key themes: design patterns for coding elegance, faster processing through concurrency and compiled Python (Cython), high-level networking, and graphics. He identifies well-proven design patterns that are useful in Python, illuminates them with expert-quality code, and explains why some object-oriented design patterns are irrelevant to Python. He also explodes several counterproductive myths about Python programming—showing, for example, how Python can take full advantage of multicore hardware. ...
Visual Basic 2010 Unleashed
Visual Basic 2010 Unleashed

Visual Basic 2010 Unleashed is the most comprehensive, practical reference to modern object-oriented programming with Visual Basic 2010. Written by Visual Basic MVP Alessandro Del Sole, a long-time leader of the global VB community, this book illuminates the core of the VB language and demonstrates its effective use in a wide variety of programming scenarios. Del Sole covers both Visual Basic 2010 Professional Edition for professional developers and the Express Edition for hobbyists, novices, and students. Writing for VB programmers at all levels of experience, he walks through using VB 2010 for data access, user interface development, networking, communication, and many other tasks. ...
Continuous Delivery and DevOps: A Quickstart Guide, 2nd Edition
Continuous Delivery and DevOps: A Quickstart Guide, 2nd Edition

Continuous Delivery (CD) and DevOps are fast becoming the next big thing(s) in relation to the delivery and support of software. This updated edition provides you with a clear and concise insight in to what CD and DevOps are all about, how to go about preparing for and implementing them, and what quantifiable business value they bring. You will be guided through the various stages of CD and DevOps adoption, the impact they will have on you and your business, how you can overcome common problems, and what to do once CD and DevOps have become embedded in your ways of working. Included within are some real-world examples, tricks, tips, and observations that should help ease the adoption and allow you to fully utilize CD and DevOps to deliver quality software. ...
Mastering Splunk
Mastering Splunk

Splunk is the definitive technology solution used to manage the ever-growing volumes of machine-generated data. This technology is indispensable for industries involved in big data analysis, online services, education, finance, healthcare, retail, and telecommunications. So, having Splunk experience will be relevant for a long time to come! This book will first take you through the evolution of Splunk and how it fits into an organization's architectural roadmap. Master advanced search topics and explore in-depth methods to leverage Splunk tables, charts, fields, and other cases. As we advance through the chapters, you will master the best practices of values and lookups, indexes, business effective dashboards, and discover the cornerstones of how to evolve your current Splunk application and its monitoring capabilities. Finally, we round things off with the discussion of transactions from an enterprise perspective. ...
Hyper-V Security
Hyper-V Security

Keeping systems safe and secure is a new challenge for Hyper-V Administrators. As critical data and systems are transitioned from traditional hardware installations into hypervisor guests, it becomes essential to know how to defend your virtual operating systems from intruders and hackers. Hyper-V Security is a rapid guide on how to defend your virtual environment from attack. This book takes you step by step through your architecture, showing you practical security solutions to apply in every area. After the basics, you'll learn methods to secure your hosts, delegate security through the web portal, and reduce malware threats. ...
HBase Design Patterns
HBase Design Patterns

With the increasing use of NoSQL in general and HBase in particular, knowing how to build practical applications depends on the application of design patterns. These patterns, distilled from extensive practical experience of multiple demanding projects, guarantee the correctness and scalability of the HBase application. They are also generally applicable to most NoSQL databases. Starting with the basics, this book will show you how to install HBase in different node settings. You will then be introduced to key generation and management and the storage of large files in HBase. Moving on, this book will delve into the principles of using time-based data in HBase, and show you some cases on denormalization of data while working with HBase. Finally, you will learn how to translate the familiar SQL design practices into the NoSQL world. With this concise guide, you will get a better idea of typical storage patterns, application design templates, HBase explorer in multiple scenarios with ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025