A book-and-video introduction to Microsoft's Business Intelligence tools
If you are just starting to get a handle on Microsoft Business Intelligence (BI) tools, this book and accompanying video prov……続きを見る
Configure, manage, and secure a CentOS 7 Linux server to serve a variety of services provided in a sustainable computer's infrastructure.
About This Book
Learn how to efficiently set up and manage ……続きを見る
This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregatio……続きを見る
This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival pro……続きを見る
Industry 4.0 refers to fourth generation of industrial activity characterized by smart systems and internet-based solutions. This book describes the fourth revolution based on instrumented, intercon……続きを見る
From building your own cluster to running cloud-native applications with Kubernetes, this workshop covers it all using engaging examples and activities
Key Features
Explore the Kubernetes environme……続きを見る
Modernize and optimize network management with APIs and automation
Legacy network management approaches don't scale adequately and can't be automated well. This guide will help meet tomorrow's chall……続きを見る
Simple Mail Transfer Protocol (SMTP) is a set of rules used while sending emails. Usually, this protocol is associated with IMAP or POP3. However, SMTP is utilized to deliver messages, while POP3 an……続きを見る
Email is a critical tool for everyday business communication and productivity. Fortinet's email security solution - FortiMail delivers advanced multi-layered protection against the full spectrum of ……続きを見る
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or ……続きを見る
This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed "how-to" instructions are presented, which will be of use ……続きを見る
An in-depth look at the radical changes to the newest release of SISS
Microsoft SQL Server 2012 Integration Services (SISS) builds on the revolutionary database product suite first introduced in 200……続きを見る
Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking
Mobile ad hoc networks (……続きを見る
Fill the gap between planning and doing with SSIS 2014
The 2014 release of Microsoft's SQL Server Integration Services provides enhancements for managing extraction, transformation, and load operati……続きを見る
Competencias básicas para sobrevivir en el siglo XXI: seleccionar información relevante, colaborar con otros, comunicarse de manera versátil, participar en la vida pública. Reflexiones, ideas, activ……続きを見る
Explore every nook and cranny of the Android OS to modify your device and guard it against security threats
About This Book
Understand and counteract against offensive security threats to your appl……続きを見る
Configure Ansible and start coding YAML playbooks using the appropriate modules
Key Features
Create and use Ansible Playbook to script and organise management tasks
Benefit from the Ansible communi……続きを見る
Wireless networking covers a variety of topics involving many challenges. The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the i……続きを見る
This book provides information about wireless systems and WIMAX modeling. The authors provide various techniques for the WiMAX systems such as antenna diversity and Alamouti coding. The performance ……続きを見る
Découvrez 100 techniques et stratégies concrètes pour améliorer le référencement de votre site, à travers ce guide pratique.
Du débutant à l’expert, ces techniques et méthodes sont chacune à mettre ……続きを見る
Learn over 116 Linux commands to develop the skills you need to become a professional Linux system administrator
Key Features
Explore essential Linux commands and understand how to use Linux help t……続きを見る
iPhone 12 is 5G technology, having a new era for the world’s best smartphone. The newly designed iPhone 12 models is encrypted with expansive edge-to-edge Super Retina XDR displays for a brighter, m……続きを見る
Software-Defined Networks (SDN) are transforming the Internet by replacing bundled, proprietary hardware and control software. SDN is being embraced by cloud providers, telcos, and enterprises, as i……続きを見る
This book dives into radio resource allocation optimizations, a research area for wireless communications, in a pragmatic way and not only includes wireless channel conditions but also incorporates ……続きを見る
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learni……続きを見る
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes ……続きを見る
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and ……続きを見る