Listing 1 - 10 of 884 | << page >> |
Sort by
|
Choose an application
This Annual International Conference is a established platform in which e business, e commerce and e banking and e tourism issues can be examined from several global perspective through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the both developing & developed countries and from around the globe The two days conference will focus on the challenges of complexity, rapid pace of change and risk opportunity issues associated with modern products, systems, special events infrastructures.
Choose an application
CyberSA 2016 is an international refereed conference dedicated to the advancement of the principles, methods and applications of situational awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Cyber Physical Systems (CPS) and Internet of Things (IoTs).
Choose an application
Annotation NTMS 2016 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state of the art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.
Choose an application
A handy reference guide for data analysts and data scientists to help to obtain value from big data analytics using Spark on Hadoop clusters About This Book This book is based on the latest 2.0 version of Apache Spark and 2.7 version of Hadoop integrated with most commonly used tools. Learn all Spark stack components including latest topics such as DataFrames, DataSets, GraphFrames, Structured Streaming, DataFrame based ML Pipelines and SparkR. Integrations with frameworks such as HDFS, YARN and tools such as Jupyter, Zeppelin, NiFi, Mahout, HBase Spark Connector, GraphFrames, H2O and Hivemall. Who This Book Is For Though this book is primarily aimed at data analysts and data scientists, it will also help architects, programmers, and practitioners. Knowledge of either Spark or Hadoop would be beneficial. It is assumed that you have basic programming background in Scala, Python, SQL, or R programming with basic Linux experience. Working experience within big data environments is not mandatory. What You Will Learn Find out and implement the tools and techniques of big data analytics using Spark on Hadoop clusters with wide variety of tools used with Spark and Hadoop Understand all the Hadoop and Spark ecosystem components Get to know all the Spark components: Spark Core, Spark SQL, DataFrames, DataSets, Conventional and Structured Streaming, MLLib, ML Pipelines and Graphx See batch and real-time data analytics using Spark Core, Spark SQL, and Conventional and Structured Streaming Get to grips with data science and machine learning using MLLib, ML Pipelines, H2O, Hivemall, Graphx, SparkR and Hivemall. In Detail Big Data Analytics book aims at providing the fundamentals of Apache Spark and Hadoop. All Spark components ? Spark Core, Spark SQL, DataFrames, Data sets, Conventional Streaming, Structured Streaming, MLlib, Graphx and Hadoop core components ? HDFS, MapReduce and Yarn are explored in greater depth with implementation examples on Spark + Hadoop clusters. It is moving away from MapReduce to Spark. So, advantages of Spark over MapReduce are explained at great depth to reap benefits of in-memory speeds. DataFrames API, Data Sources API and new Data set API are explained for building Big Data analytical applications. Real-time data analytics using Spark Streaming with Apache Kafka and HBase is covered to help building streaming applications. New Structured streaming concept is explained with an IOT (Internet of Things) use case. Machine learni...
Choose an application
Annotation CIKM'16 : ACM Conference on Information and Knowledge Management Oct 24, 2016-Oct 28, 2016 Indianapolis, USA. You can view more information about this proceeding and all of ACM#65533;s other published conference proceedings from the ACM Digital Library: http://www.acm.org/dl.
Choose an application
Today almost half of the global population is online and an estimated 3.2 billion people stay connected: falling victims to cybercrimes and cyberbullying; suffering from Internet Addiction and cyber-related disorders; cheated by other online users and haunted by their own past mistakes suddenly posted online. On the Internet every information may become a permanent record, following the users who were not aware of the consequences of their ‘click’ when they shared a photo, posted a text, or filled a form, not knowing who was on the other end. A friend of a cyber-friend may turn into a cyberbully, online love affairs may end in cyberstalking, sharing too much information may lead to cybercrimes, Internet frauds and identity thefts. Very often the recklessness or unawareness of Internet users make them vulnerable to all sorts of cyber abuse. How can we protect ourselves and make cyberspace a safer place? This interdisciplinary volume seeks to explore the practical dimensions of cyber threats and the changes cyber space brought to the social and cultural environment we have known so far.
Choose an application
Agriculture --- Food --- Agricultural industries --- Food industry and trade --- Safety measures. --- Safety measures. --- Security measures --- Security measures
Choose an application
PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your environment. PCI Compliance, 3.1 Addendum serves as an update to Syngress’ comprehensive reference volume PCI Compliance, Fourth Edition . Includes all system updates to the new version of PCI DSS 3.1 Details and describes each update and enhancement Includes case studies that illustrate when and where these changes will effect and improve your enterprise
Credit cards --- Data protection. --- Security measures. --- Security measures --- Standards.
Choose an application
Medical errors --- Hospital patients --- Hospitals --- Prevention. --- Safety measures. --- Safety measures.
Choose an application
Listing 1 - 10 of 884 | << page >> |
Sort by
|