IT eBooks
Download, Read, Use
Statistical Pattern Recognition, 3rd Edition
Statistical Pattern Recognition, 3rd Edition

Statistical pattern recognition relates to the use of statistical techniques for analysing data measurements in order to extract information and make justified decisions. It is a very active area of study and research, which has seen many advances in recent years. Applications such as data mining, web searching, multimedia data retrieval, face recognition, and cursive handwriting recognition, all require robust and efficient pattern recognition techniques. ...
Migration from Windows Server 2008 and 2008 R2 to 2012 How-to
Migration from Windows Server 2008 and 2008 R2 to 2012 How-to

Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Install and configure Windows Server 2012 and upgrade Active Directory. Decommission old servers and convert your environment into the Windows Server 2012 native environment. Walks you through different migration scenarios based on the author's own experience, providing a step-by-step guide to solving real-world business problems. ...
History of Programming Languages
History of Programming Languages

This specially prepared work comprises a living archive of important programming languages, described by the people most instrumental in their creation and development. Drawn from the ACM/SIGPLAN Second History of Programming Languages Conference, this volume, like the earlier book from the first such conference (HOPL), conveys the motivations of the language designers, and the reasons why they rejected existing languages and created new ones. The book relates the processes by which different languages evolved, in the words of the individuals active in the languages' development. Most important, participants share insights about influences and decisions, both on choices made, and on the many roads not taken. In the book's conclusion, distinguished historians of computing share views about preserving programming language history. ...
Kinect Hacks
Kinect Hacks

Create your own innovative applications in computer vision, game design, music, robotics, and other areas by taking full advantage of Kinect's extensive interactive, multi-media platform. With this book, you get a step-by-step walkthrough of the best techniques and tools to come out of the OpenKinect project, the largest and most active Kinect hacking community. Learn dozens of hacks for building interfaces that respond to body movements, gestures, and voice, using open source toolkits such as openFrameworks, the Processing IDE, and OpenKinect driver library. Whether you're an artist, designer, researcher, or hobbyist, this book will give you a running start with Kinect. ...
CherryPy Essentials
CherryPy Essentials

CherryPy is a Python library for web development that allows developers to build web applications in the same way as any other object-oriented Python program. Enriched by several years of active development, it has become one of the most established toolkits for building solid and high-performance web applications in Python. CherryPy abstracts the complex low-level HTTP protocol into an easy-to-use interface that respects Python idioms. The library aims at being simple to learn for a beginner while offering the most advanced features to fluent Python developers. For these reasons CherryPy was chosen to be at the heart of the popular and feature-rich TurboGears web framework. CherryPy-powered web applications are stand-alone Python applications with their own embedded multi-threaded web server, but can also run behind Apache or IIS for scalability. ...
Open Source Identity Management Patterns and Practices Using OpenAM 10.x
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diverse web applications that might typically operate against a disparate set of identity repositories and that are hosted on a variety of platforms such as web application servers. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is a condensed, practical guide on installing OpenAM to protect your web applications. This book will teach you how to integrate to different identity sources such as Active Directory or Facebook using two-factor authentications. ...
Exam 70-640: Configuring Windows Server 2008 Active Directory, 2nd Edition
Exam 70-640: Configuring Windows Server 2008 Active Directory, 2nd Edition

Fully updated for Windows Server 2008 R2! Ace your preparation for the skills measured by Exam 70-640 - and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply your knowledge to real-world case scenarios and practice exercises. This kit also includes a 15% exam discount from Microsoft. ...
Windows Small Business Server 2011
Windows Small Business Server 2011

Portable and precise, this pocket-sized guide delivers ready answers for administering Windows Small Business Server 2011 Standard. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You'll get the focused information you need to solve problems and get the job done - whether at your desk or in the field. Get fast facts to: Install Windows Small Business Server 2011 on-premise; Use Active Directory to manage computers and users; Handle core administrative tasks with the console; Use permissions to control access to network resources; Manage your data storage resources; Administer email with Microsoft Exchange Server 2010; Monitor the performance of your servers and workstations; Build an intranet with Microsoft SharePoint 2010; Migrate an existing network ...
Optimizing Service Manager
Optimizing Service Manager

Microsoft System Center 2012 Service Manager is the only product that can integrate across most of the System Center suite and Active Directory. Service Manager is a fast and reliable product that can create and maintain a dynamic service management database to enable interaction across the organization, both inside and outside the IT department, making it a very compelling product to many organizations. Over the last several years, more and more customers have implemented Service Manager, either independently or via Microsoft or a partner. Sometimes the project and product implementation are not as successful as they should be. Our objectives with this book are to provide you with a framework for planning and delivering a successful Service Manager project and to share some of our experiences and best practices when it comes to optimizing and maintaining your Service Manager environment. ...
Oracle Enterprise Manager Grid Control 11g R1
Oracle Enterprise Manager Grid Control 11g R1

Govern Business Service Management using Oracle Enterprise Manager 11gR1 Discover the evolution of enterprise IT infrastructure and the modeling paradigms to manage it. Use and apply various techniques in modeling complex data centers using Oracle Enterprise Manager. Model and define various composite targets such as Groups, Systems,and Services. Understand active and passive modeling using Beacons, Service Tests, and System targets. Monitor the capabilities of service targets in Oracle Enterprise Manager with a special focus on service levels, dashboards, widgets, and reports. Learn the key techniques and best practices of modeling and monitoring data centers using pragmatic examples. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2024