IT eBooks
Download, Read, Use
Splunk Operational Intelligence Cookbook, 3rd Edition
Splunk Operational Intelligence Cookbook, 3rd Edition

Splunk makes it easy for you to take control of your data, and with Splunk Operational Cookbook, you can be confident that you are taking advantage of the Big Data revolution and driving your business with the cutting edge of operational intelligence and business analytics. With more than 70 recipes that demonstrate all of Splunk's features, not only will you find quick solutions to common problems, but you'll also learn a wide range of strategies and uncover new ideas that will make you rethink what operational intelligence means to you and your organization. You'll discover recipes on data processing, searching and reporting, dashboards, and visualizations to make data shareable, communicable, and most importantly meaningful. You'll also find step-by-step demonstrations that walk you through building an operational intelligence application containing vital features essential to understanding data and to help you successfully integrate a data-driven way of thinking in your organ ...
Mastering Machine Learning Algorithms
Mastering Machine Learning Algorithms

Machine learning is a subset of AI that aims to make modern-day computer systems smarter and more intelligent. The real power of machine learning resides in its algorithms, which make even the most difficult things capable of being handled by machines. However, with the advancement in the technology and requirements of data, machines will have to be smarter than they are today to meet the overwhelming data needs; mastering these algorithms and using them optimally is the need of the hour. Mastering Machine Learning Algorithms is your complete guide to quickly getting to grips with popular machine learning algorithms. You will be introduced to the most widely used algorithms in supervised, unsupervised, and semi-supervised machine learning, and will learn how to use them in the best possible manner. Ranging from Bayesian models to the MCMC algorithm to Hidden Markov models, this book will teach you how to extract features from your dataset and perform dimensionality reduction by maki ...
Data Management in Cloud, Grid and P2P Systems
Data Management in Cloud, Grid and P2P Systems

This book constitutes the refereed proceedings of the 6th International Conference on Data Management in Grid and Peer-to-Peer Systems, Globe 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in the following topical sections: data partitioning and consistency; RDF data publishing, querying linked data, and applications; and distributed storage systems and virtualization. ...
Game Analytics
Game Analytics

Developing a successful game in today's market is a challenging endeavor. Thousands of titles are published yearly, all competing for players' time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing the quality of the player experience. It has led to a paradigm shift in the development and design strategies of digital games, bringing data-driven intelligence practices into the fray for informing decision making at operational, tactical and strategic levels. Game Analytics - is the first book on the topic of game analytics; the process of discovering and communicating patterns in data towards evaluating and driving action, improving performance and solving problems in game development and game research. ...
iCloud for Developers
iCloud for Developers

Your app's users want their application data to be in sync as they switch from one device to another. Guided by iOS expert Cesare Rocchi, you'll start by learning how to configure an app and its resources for iCloud. Then, after a quick introduction to iCloud-supported data types, you'll work on using the simplest: key-value data. Next, you'll find out how to get your document-based data (including media files), and even relational data working with iCloud. As you learn each new technique, you'll use it to synchronize yet another module of the book's sample app, Grocery, a simple shopping list that can be shared between two or more devices. ...
Learning R
Learning R

Learn how to perform data analysis with the R language and software environment, even if you have little or no programming experience. With the tutorials in this hands-on guide, you'll learn how to use the essential R tools you need to know to analyze data, including data types and programming concepts. The second half of Learning R shows you real data analysis in action by covering everything from importing data to publishing your results. Each chapter in the book includes a quiz on what you've learned, and concludes with exercises, most of which involve writing R code. ...
Next-Generation Big Data
Next-Generation Big Data

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies. Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book covers not only the main technology stack but also the next-generation tools and applications used for big data warehousing, data warehouse optimization, real-time and batch data ingestion and processing, real-time data visualization, big data governance, data wrangling, big data cloud deployments, and distributed in-memory big data computing. Finally, the book has an extensive and detailed coverage of big data case studies from Navistar, Cerner, British Telecom, Shopzilla, Thomson Reuters, and Mastercard. Install Apache Kudu, Impala, and Spark to modernize enterprise data warehouse and business intelligence environments, complete with real-world, easy-to-follow examples, and ...
Veracity of Big Data
Veracity of Big Data

Examine the problem of maintaining the quality of big data and discover novel solutions. You will learn the four V's of big data, including veracity, and study the problem from various angles. The solutions discussed are drawn from diverse areas of engineering and math, including machine learning, statistics, formal methods, and the Blockchain technology. Veracity of Big Data serves as an introduction to machine learning algorithms and diverse techniques such as the Kalman filter, SPRT, CUSUM, fuzzy logic, and Blockchain, showing how they can be used to solve problems in the veracity domain. Using examples, the math behind the techniques is explained in easy-to-understand language. Determining the truth of big data in real-world applications involves using various tools to analyze the available information. This book delves into some of the techniques that can be used. Microblogging websites such as Twitter have played a major role in public life, including during presidential e ...
Beginning Backup and Restore for SQL Server
Beginning Backup and Restore for SQL Server

Be guided through the techniques to back up and restore databases and files in SQL Server. Multiple techniques are presented for ensuring the integrity and consistency of database backups, as well as the reliability and manageability of restoring from backups. In today's data-driven world, the most important asset that a company has is its data. Data recovery strategies can be wide ranging; from the practically non-existent backup without verification to a very complex, distributed, and redundant system. An important objective for any database administrator is data loss prevention, and in a catastrophic data loss event, pre-defined data recovery techniques must be employed in order to get the databases back up and running efficiently and quickly. Using a tutorial method of teaching, Beginning Backup and Restore for SQL Server explores the many facets behind the principles of backing up and restoring data from your database, and then shows practical application methods for gettin ...
Defending IoT Infrastructures with the Raspberry Pi
Defending IoT Infrastructures with the Raspberry Pi

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025