Found 664 books
Gateway to Business Analytics with Microsoft Excel

What exactly is business analytics? The business part is easy; it means a commercial operation or a company. Business is often associated with entrepreneurship and management. Business analytics is a new, expanding subfield with fuzzy edges that overlap into a variety of other established disciplines, including economics, econometrics, computer science, data science, finance, statistics,

Python re(gex)?

Scripting and automation tasks often need to extract particular portions of text from input data or modify them from one format to another. This book will help you learn Regular Expressions, a mini-programming language for all sorts of text processing needs. The book heavily leans on examples to present features of regular expressions one by one. It is recommended that you manually type

The Crystal Ball Instruction Manual, Volume 1

Stephen Davies notes that if this marks the reader's first exposure to data science, they occupy an enviable position, with all the "cool stuff" still ahead of them. He expresses a sense of jealousy but also excitement to explore the field again with the reader. The text states that this field has changed the world on an incredibly short time scale. Davies observes that just decades ago,

Db2 Optimization Techniques for SAP Database Migration to the Cloud

For many years, SAP migrations have been a standard process. An increasing number of customers are changing their database software to IBM Db2 for UNIX, Linux, and Windows or are moving their existing Db2 based infrastructure from on-premises into the cloud. When customers move to the cloud, a heterogeneous system copy is often needed because of a change in the underlying hardware archit

Managing Risk and Information Security

Managing Risk and Information Security: Protect to Enable, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses busin

Node.js Handbook

Node.js is built on top of the Google Chrome V8 JavaScript engine, and it's mainly used to create web servers - but it's not limited to that. Node.js Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. The author find this approach gives a well-rounded overview.

Demystifying Internet of Things Security

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Eng

25 Secrets for Faster ASP.NET Applications

Read the tips and tricks recommended by some of the smartest minds in the ASP.NET community. 25 tips from the ASP.NET community for boosting performance in your web applications; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers async/await, Web API, ORMs, interactions between your code and your database, and more... Rising adoption of MVC an

I Love Ruby

Ruby is an easy to learn programming language, it was invented by a guy named Matz in Japan. Ruby is a free software and can be used by any one for zero cost. Ruby's popularity was initially confined to Japan, later it slowly trickled out to rest of the world. Things changed with the emergence of Ruby on Rails which is a popular web-development framework written with Ruby.

Kubernetes Security and Observability

Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applic