Data Science for BusinessWritten by renowned data science experts Foster Provost and Tom Fawcett, Data Science for Business introduces the fundamental principles of data science, and walks you through the "data-analytic thinking" necessary for extracting useful knowledge and business value from the data you collect. This guide also helps you understand the many data-mining techniques in use today.
Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You'll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company's data science projects. ...
Effective C#, 2nd EditionC# has matured over the past decade: It's now a rich language with generics, functional programming concepts, and support for both static and dynamic typing. This palette of techniques provides great tools for many different idioms, but there are also many ways to make mistakes. In Effective C#, Second Edition, respected .NET expert Bill Wagner identifies fifty ways you can leverage the full power of the C# 4.0 language to express your designs concisely and clearly.
Effective C#, 2nd Edition, follows a clear format that makes it indispensable to hundreds of thousands of developers: clear, practical explanations, expert tips, and plenty of realistic code examples. Drawing on his unsurpassed C# experience, Wagner addresses everything from types to resource management to dynamic typing to multicore support in the C# language and the .NET framework. Along the way, he shows how to avoid common pitfalls in the C# language and the .NET environment. ...
Exam 77-418: MOS 2013 Study Guide for Microsoft WordDemonstrate your expertise with Microsoft Office! Designed to help you practice and prepare for the 2013 Word Microsoft Office Specialist (MOS) exam, this all-in-one study guide features: Full, objective-by-objective exam coverage; Easy-to-follow procedures and illustrations to review essential skills; Hands-on practice tasks to apply what you've learned; files included; Online pre-test to assess your readiness.
Use the in-depth exam prep, practice, and review to help advance your proficiency with Microsoft Office - and earn the credential that proves it! ...
Exam 77-424: MOS 2013 Study Guide for Microsoft AccessDemonstrate your expertise with Microsoft Office! Designed to help you practice and prepare for the 2013 Access Microsoft Office Specialist (MOS) exam, this all-in-one study guide features: Full, objective-by-objective exam coverage; Easy-to-follow procedures and illustrations to review essential skills; Hands-on practice tasks to apply what you've learned; files included; Online pre-test to assess your readiness; Use the in-depth exam prep, practice, and review to help advance your proficiency with Microsoft Office—and earn the credential that proves it! ...
Linux Thin Client Networks Design and DeploymentA thin client network is a client-server architecture where client computers depend primarily on a central server for processing activities. The client machines (thin clients) mainly focus on passing user input to remote services and receiving and displaying the output; thin clients aren't as much about the hardware or software as about the design.
This book has all the information you need to easily set up your own Linux thin client network. It will help you evaluate how a thin client network fits into your organization and make informed choices on the hardware and software needed for your deployment, discusses design issues, and guides you with building, configuring, and supporting the network. ...
Securing HadoopSecurity of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.
This book is a practitioner's guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models. ...
Learning Nessus for Penetration TestingIT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed security activities across organizations today. The Nessus tool gives the end user the ability to perform these kinds of security tests quickly and effectively.
Nessus is a widely used tool for vulnerability assessment, and Learning Nessus for Penetration Testing gives you a comprehensive insight into the use of this tool. This book is a step-by-step guide that will teach you about the various options available in the Nessus vulnerability scanner tool so you can conduct a vulnerability assessment that helps to identify exposures in IT infrastructure quickly and efficiently. This book will also give you an insight into penetration testing and how to conduct compliance checks using Nessus. ...
Introducing Windows 8Get a head start evaluating Window 8. Based on the Release Preview of the software, this guide introduces new features and capabilities, with scenario-based insights demonstrating how to plan for, deploy, and maintain Windows 8 in an enterprise environment.
Network administrators will get an early, high-level view of these topics and more: Performance, reliability, and security features; Deployment options; Managing the new UI using; Group Policy and Windows PowerShell; Internet Explorer 10; Virtualization and cloud solutions; Microsoft Desktop Optimization Pack; Recovery features. ...
Java EE 6 Pocket GuideThis handy guide provides an overview of Java Enterprise Edition 6's main technologies and includes extensive, easy-to-understand code samples that demonstrate the platform's many improvements. You'll quickly understand how Java EE 6 simplifies the process of developing and deploying web and enterprise applications. ...
Java EE 7 EssentialsGet up to speed on the principal technologies in the Java Platform, Enterprise Edition 7, and learn how the latest version embraces HTML5, focuses on higher productivity, and provides functionality to meet enterprise demands. Written by Arun Gupta, a key member of the Java EE team, this book provides a chapter-by-chapter survey of several Java EE 7 specifications, including WebSockets, Batch Processing, RESTful Web Services, and Java Message Service.
You'll also get self-paced instructions for building an end-to-end application with many of the technologies described in the book, which will help you understand the design patterns vital to Java EE development. ...