IT eBooks
Download, Read, Use
Network Security Through Data Analysis, 2nd Edition
Network Security Through Data Analysis, 2nd Edition

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. Use sensors to collect network, service, host, and active domain data; Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect; Detect unusual phenomena through exploratory data analysis (EDA ...
Fundamentals of Deep Learning
Fundamentals of Deep Learning

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that's paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field. Companies such as Google, Microsoft, and Facebook are actively growing in-house deep-learning teams. For the rest of us, however, deep learning is still a pretty complex and difficult subject to grasp. If you're familiar with Python, and have a background in calculus, along with a basic understanding of machine learning, this book will get you started. Examine the foundations of machine learning and neural networks; Learn how to train feed-forward neural networks; Use TensorFlow to implement your first neural network; Manage problems that arise as you begin to make networks deeper; Build neural networks that analyze complex images; Perform effective dimensionali ...
Practical Data Science with R
Practical Data Science with R

Business analysts and developers are increasingly collecting, curating, analyzing, and reporting on crucial business data. The R language and its associated tools provide a straightforward way to tackle day-to-day data science tasks without a lot of academic theory or advanced mathematics. Practical Data Science with R shows you how to apply the R programming language and useful statistical techniques to everyday business situations. Using examples from marketing, business intelligence, and decision support, it shows you how to design experiments (such as A/B tests), build predictive models, and present results to audiences of all levels. ...
Hacking Exposed Industrial Control Systems
Hacking Exposed Industrial Control Systems

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating? and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures. Assess your exposure and develop an effective risk management plan; Adopt the latest ICS-focused threat intelligence techniques; Use threat modeling to create realistic risk scenario ...
Exam Ref 70-768 Developing SQL Data Models
Exam Ref 70-768 Developing SQL Data Models

Prepare for Microsoft Exam 70-768 - and help demonstrate your real-world mastery of Business Intelligence (BI) solutions development with SQL Server 2016 Analysis Services (SSAS), including modeling and queries. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Design a multidimensional BI semantic model; Design a tabular BI semantic model; Develop queries using Multidimensional Expressions (MDX) and Data Analysis Expressions (DAX); Configure and maintain SSAS. This Microsoft Exam Ref: Organizes its coverage by exam objectives; Features strategic, what-if scenarios to challenge you; Assumes you are a database or BI professional with experience creating models, writing MDX or DAX queries, and using SSAS. ...
Exam Ref 70-767 Implementing a SQL Data Warehouse
Exam Ref 70-767 Implementing a SQL Data Warehouse

Prepare for Microsoft Exam 70-767 - and help demonstrate your real-world mastery of skills for managing data warehouses. This exam is intended for Extract, Transform, Load (ETL) data warehouse developers who create business intelligence (BI) solutions. Their responsibilities include data cleansing as well as ETL and data warehouse implementation. The reader should have experience installing and implementing a Master Data Services (MDS) model, using MDS tools, and creating a Master Data Manager database and web application. The reader should understand how to design and implement ETL control flow elements and work with a SQL Service Integration Services package. Focus on the expertise measured by these objectives: Design, and implement, and maintain a data warehouse; Extract, transform, and load data; Build data quality solutions. This Microsoft Exam Ref: Organizes its coverage by exam objectives; Features strategic, what-if scenarios to challenge you; Assumes you have working kno ...
Microsoft Azure Security Center
Microsoft Azure Security Center

This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management; Master a new security paradigm for a world without traditional perimeters; Gain visibility and control to secure compute, netwo ...
Tabular Modeling in Microsoft SQL Server Analysis Services, 2nd Edition
Tabular Modeling in Microsoft SQL Server Analysis Services, 2nd Edition

Create a semantic model and analyze data using the tabular model in SQL Server 2016 Analysis Services to create corporate-level business intelligence (BI) solutions. Led by two BI experts, you will learn how to build, deploy, and query a tabular model by following detailed examples and best practices. This hands-on book shows you how to use the tabular model's in-memory database to perform rapid analytics - whether you are new to Analysis Services or already familiar with its multidimensional model. Discover how to: Determine when a tabular or multidimensional model is right for your project; Build a tabular model using SQL Server Data Tools in Microsoft Visual Studio 2015; Integrate data from multiple sources into a single, coherent view of company information; Choose a data-modeling technique that meets your organization's performance and usability requirements; Implement security by establishing administrative and data user roles; Define and implement partitioning strategies to r ...
Hands-On Machine Learning with C#
Hands-On Machine Learning with C#

The necessity for machine learning is everywhere, and most production enterprise applications are written in C# using tools such as Visual Studio, SQL Server, and Microsoft Azur2e. Hands-On Machine Learning with C# uniquely blends together an understanding of various machine learning concepts, techniques of machine learning, and various available machine learning tools through which users can add intelligent features.These tools include image and motion detection, Bayes intuition, and deep learning, to C# .NET applications. Using this book, you will learn to implement supervised and unsupervised learning algorithms and will be better equipped to create excellent predictive models. In addition, you will learn both supervised and unsupervised forms of regression, mainly logistic and linear regression, in depth. Next, you will use the nuML machine learning framework to learn how to create a simple decision tree. In the concluding chapters, you will use the Accord.Net machine learning f ...
QlikView Server and Publisher
QlikView Server and Publisher

QlikView is the most flexible enterprise Business Intelligence platform for transforming information into knowledge. Users can effectively consolidate relevant data from multiple sources into a single application, create reports, and visualize content for unprecedented business insight using QlikView. QlikView Server allows the nesting of multiple servers for data load balancing and enables users to access data using their PC and mobile devices. QlikView Publisher ensures that the right information reaches the right user at the right time, and gives further centralized administration and management. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025