The Postage Stamp

The Postage Stamp PDF Author: Frederick John Melville
Publisher:
ISBN:
Category : Stamp collecting
Languages : en
Pages : 308

Get Book Here

Book Description

The Postage Stamp

The Postage Stamp PDF Author: Frederick John Melville
Publisher:
ISBN:
Category : Stamp collecting
Languages : en
Pages : 308

Get Book Here

Book Description


Databases and Information Systems X

Databases and Information Systems X PDF Author: A. Lupeikiene
Publisher: IOS Press
ISBN: 1614999414
Category : Computers
Languages : en
Pages : 298

Get Book Here

Book Description
The importance of databases and information systems to the functioning of 21st century life is indisputable. This book presents papers from the 13th International Baltic Conference on Databases and Information Systems, held in Trakai, Lithuania, from 1- 4 July 2018. Since the first of these events in 1994, the Baltic DB&IS has proved itself to be an excellent forum for researchers, practitioners and PhD students to deliver and share their research in the field of advanced information systems, databases and related areas. For the 2018 conference, 69 submissions were received from 15 countries. Each paper was assigned for review to at least three referees from different countries. Following review, 24 regular papers were accepted for presentation at the conference, and from these presented papers the 14 best-revised papers have been selected for publication in this volume, together with a preface and three invited papers written by leading experts. The selected revised and extended papers present original research results in a number of subject areas: information systems, requirements and ontology engineering; advanced database systems; internet of things; big data analysis; cognitive computing; and applications and case studies. These results will contribute to the further development of this fast-growing field, and will be of interest to all those working with advanced information systems, databases and related areas.

Mahout in Action

Mahout in Action PDF Author: Sean Owen
Publisher: Simon and Schuster
ISBN: 1638355371
Category : Computers
Languages : en
Pages : 616

Get Book Here

Book Description
Summary Mahout in Action is a hands-on introduction to machine learning with Apache Mahout. Following real-world examples, the book presents practical use cases and then illustrates how Mahout can be applied to solve them. Includes a free audio- and video-enhanced ebook. About the Technology A computer system that learns and adapts as it collects data can be really powerful. Mahout, Apache's open source machine learning project, captures the core algorithms of recommendation systems, classification, and clustering in ready-to-use, scalable libraries. With Mahout, you can immediately apply to your own projects the machine learning techniques that drive Amazon, Netflix, and others. About this Book This book covers machine learning using Apache Mahout. Based on experience with real-world applications, it introduces practical use cases and illustrates how Mahout can be applied to solve them. It places particular focus on issues of scalability and how to apply these techniques against large data sets using the Apache Hadoop framework. This book is written for developers familiar with Java -- no prior experience with Mahout is assumed. Owners of a Manning pBook purchased anywhere in the world can download a free eBook from manning.com at any time. They can do so multiple times and in any or all formats available (PDF, ePub or Kindle). To do so, customers must register their printed copy on Manning's site by creating a user account and then following instructions printed on the pBook registration insert at the front of the book. What's Inside Use group data to make individual recommendations Find logical clusters within your data Filter and refine with on-the-fly classification Free audio and video extras Table of Contents Meet Apache Mahout PART 1 RECOMMENDATIONS Introducing recommenders Representing recommender data Making recommendations Taking recommenders to production Distributing recommendation computations PART 2 CLUSTERING Introduction to clustering Representing data Clustering algorithms in Mahout Evaluating and improving clustering quality Taking clustering to production Real-world applications of clustering PART 3 CLASSIFICATION Introduction to classification Training a classifier Evaluating and tuning a classifier Deploying a classifier Case study: Shop It To Me

Beautiful Code

Beautiful Code PDF Author: Greg Wilson
Publisher: "O'Reilly Media, Inc."
ISBN: 0596554672
Category : Computers
Languages : en
Pages : 621

Get Book Here

Book Description
How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their eyes. This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. This book contains 33 chapters contributed by Brian Kernighan, KarlFogel, Jon Bentley, Tim Bray, Elliotte Rusty Harold, Michael Feathers,Alberto Savoia, Charles Petzold, Douglas Crockford, Henry S. Warren,Jr., Ashish Gulhati, Lincoln Stein, Jim Kent, Jack Dongarra and PiotrLuszczek, Adam Kolawa, Greg Kroah-Hartman, Diomidis Spinellis, AndrewKuchling, Travis E. Oliphant, Ronald Mak, Rogerio Atem de Carvalho andRafael Monnerat, Bryan Cantrill, Jeff Dean and Sanjay Ghemawat, SimonPeyton Jones, Kent Dybvig, William Otte and Douglas C. Schmidt, AndrewPatzer, Andreas Zeller, Yukihiro Matsumoto, Arun Mehta, TV Raman,Laura Wingerd and Christopher Seiwald, and Brian Hayes. Beautiful Code is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.

Big Data Preprocessing

Big Data Preprocessing PDF Author: Julián Luengo
Publisher: Springer Nature
ISBN: 3030391051
Category : Computers
Languages : en
Pages : 193

Get Book Here

Book Description
This book offers a comprehensible overview of Big Data Preprocessing, which includes a formal description of each problem. It also focuses on the most relevant proposed solutions. This book illustrates actual implementations of algorithms that helps the reader deal with these problems. This book stresses the gap that exists between big, raw data and the requirements of quality data that businesses are demanding. This is called Smart Data, and to achieve Smart Data the preprocessing is a key step, where the imperfections, integration tasks and other processes are carried out to eliminate superfluous information. The authors present the concept of Smart Data through data preprocessing in Big Data scenarios and connect it with the emerging paradigms of IoT and edge computing, where the end points generate Smart Data without completely relying on the cloud. Finally, this book provides some novel areas of study that are gathering a deeper attention on the Big Data preprocessing. Specifically, it considers the relation with Deep Learning (as of a technique that also relies in large volumes of data), the difficulty of finding the appropriate selection and concatenation of preprocessing techniques applied and some other open problems. Practitioners and data scientists who work in this field, and want to introduce themselves to preprocessing in large data volume scenarios will want to purchase this book. Researchers that work in this field, who want to know which algorithms are currently implemented to help their investigations, may also be interested in this book.

Statistics in a Nutshell

Statistics in a Nutshell PDF Author: Sarah Boslaugh
Publisher: "O'Reilly Media, Inc."
ISBN: 1449316824
Category : Computers
Languages : en
Pages : 595

Get Book Here

Book Description
A clear and concise introduction and reference for anyone new to the subject of statistics.

Network Security with OpenSSL

Network Security with OpenSSL PDF Author: John Viega
Publisher: "O'Reilly Media, Inc."
ISBN: 0596551975
Category : Computers
Languages : en
Pages : 387

Get Book Here

Book Description
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.

The Benchmark Handbook

The Benchmark Handbook PDF Author: Jim Gray
Publisher: Morgan Kaufmann Publishers
ISBN:
Category : Computers
Languages : en
Pages : 618

Get Book Here

Book Description
A practical guide that offers the reader a comprehensive view of benchmarking for modern transaction processing and database systems. Much of the information is available for the first time. The handbook provides the tools to evaluate different systems, different software products on a single machine, and different machines within a single product family.

Proceedings of the ACM Symposium on Cloud Computing

Proceedings of the ACM Symposium on Cloud Computing PDF Author: Association for Computing Machinery
Publisher:
ISBN:
Category : Human-computer interaction
Languages : en
Pages : 0

Get Book Here

Book Description


Hadoop Security

Hadoop Security PDF Author: Ben Spivey
Publisher: "O'Reilly Media, Inc."
ISBN: 1491901349
Category : Computers
Languages : en
Pages : 336

Get Book Here

Book Description
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access