-
Author Marc Nuri San Felix , Alex Soto Bueno
Create and deploy standalone, fully functional, web applications using Quarkus and ReactKey FeaturesGet up and running with web application development speedily using React and QuarkusGet an overview of how to make a Java backend work seamlessly with a JavaScript frontendLearn how to deploy your wor....
Release Date 2022/11 -
Real World Health Care Data Analysis
Author Josep Maria Haro , Robert L Obenchain , Felicitas Kuehne , Uwe Siebert , Zbigniew Ka
Discover best practices for real world data research with SAS code and examples Real world health care data is common and growing in use with sources such as observational studies, patient registries, electronic medical record databases, insurance healthcare claim....
Release Date 2020/01 -
Penetration Testing: A guide for business and IT managers
Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
Release Date 2019/08 -
Securing Your Cloud: IBM Security for LinuxONE
Author Maciej Olejniczak , Felipe Cardeneti Mendes , Karen Medhat Fahmy , Klaus Egeler , Ed
As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure.This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level th....
Release Date 2019/08 -
What Problems Will You Solve with Blockchain?
Author Karim R. Lakhani , Teppo Felin
Organizations need to focus on how blockchain can be used to support their unique strategies. Without this focus, they risk investing in initiatives that don’t provide meaningful value. Show and hide more
Release Date 2018/10 -
IBM Spectrum Scale Functionality to Support GDPR Requirements
Author Nils Haustein , Felipe Knop , Carl Zetie , Clodoaldo Barrera , Sandeep R. Patil
The role of the IT solutions is to enforce the correct handling of personal data using processes developed by the establishment. Each element of the solution stack must address the objectives as appropriate to the data that it handles. Typically, personal data exis....
Release Date 2018/04 -
What Sets Breakthrough Strategies Apart
Author Todd Zenger , Teppo Felin
Composing valuable strategies requires seeing the world in new and unique ways. It requires asking novel questions that prompt fresh insight. Even the most sophisticated, deep learning-enhanced computers or algorithms simply cannot generate such an outlook. Innovat....
Release Date 2018/01 -
Author V Kishore Ayyadevara , Ruben Oliva Ramos , L. Felipe Martins
Tackle the most sophisticated problems associated with scientific computing and data manipulation using SciPyAbout This BookCovers a wide range of data science tasks using SciPy, NumPy, pandas, and matplotlibEffective recipes on advanced scientific computations, st....
Release Date 2017/12 -
Learn Salesforce Lightning: The Visual Guide to the Lightning UI
Author Rachelle Hoffman , Felicia Duarte
Refer to this invaluable how-to guide for basic training on Salesforce Lightning. Salespeople and technical users and consultants will no longer have to resort to learning the interface on their own, which is very time consuming.Learn Salesforce Lightning is a step....
Release Date 2017/12 -
Puppet: Mastering Infrastructure Automation
Author Thomas Uphillis , Jaime Soriano Pastor , Alessandro Franceschi , Martin Alfke , Feli
Start pulling the strings of your IT infrastructure effectively with Puppet ? learn how to configure, customize and manage your systems more intelligently in an enterprise deployment.About This BookStep-by-step instructions to jump start your Puppet deployment and ....
Release Date 2017/06 -
Python: End-to-end Data Analysis
Author Luiz Felipe Martins , Magnus Vilhelm Persson , Ivan Idris , Martin Czygan , Phuong V
Leverage the power of Python to clean, scrape, analyze, and visualize your dataAbout This BookClean, format, and explore your data using the popular Python libraries and get valuable insights from itAnalyze big data sets; create attractive visualizations; manipulate....
Release Date 2017/05 -
Building Cognitive Applications with IBM Watson Services: Volume 6 Speech to Text and Text to Speech
Author Lak Sri , Pallavi Singh , Felipe Santiago
AbstractThe Building Cognitive Applications with IBM Watson Services series is a seven-volume collection that introduces IBM® Watson™ cognitive computing services. The series includes an overview of specific IBM Watson® services with their associated architectures ....
Release Date 2017/05 -
When Strategy Walks Out the Door
Author Teppo Felin
There certainly is no shortage of high-priced consultants willing to answer the big questions of strategy. And advice about the “best” strategy can also be found in any number of management books. But managers should be skeptical consumers of external....
Release Date 2016/10 -
Mastering Python Data Analysis
Author Luiz Felipe Martins , Magnus Vilhelm Persson
Become an expert at using Python for advanced statistical analysis of data using real-world examplesAbout This BookClean, format, and explore data using graphical and numerical summariesLeverage the IPython environment to efficiently analyze data with PythonPacked ....
Release Date 2016/06 -
Author Krishnendu Roy , Felicia Kamriani
A step-by-step introductory guide to mobile app development with App Inventor 2About This BookGet an introduction to the functionalities of App Inventor 2 and use it to unleash your creativityLearn to navigate the App Inventor platform, develop basic coding skills ....
Release Date 2016/04 -
Mastering the Market Intelligence Challenge
Author Teppo Felin , Stephan Kudyba , Thomas H. Davenport , Edward E. Lawler III , Thomas W
Multinational companies have invested heavily in emerging economies — over $3 trillion since 1998, by one estimate. Many of these companies, however, have not adapted their products and operations sufficiently to succeed in these markets, and returns have oft....
Release Date 2016/01 -
When Consensus Hurts the Company
Author Alfredo Enrione , Felipe Csaszar
Boards and top management teams often try to gain consensus about important decisions. New research offers insights into when that's the right course, when it isn't - and how leaders can determine the best form of decision making for a given situation. Sho....
Release Date 2015/04 -
Author L. Felipe Martins
Compute scientific data and execute code interactively with NumPy and SciPy In DetailIn data science, it is difficult to present interesting visual or technical content, as it involves scientific notations that are not easy to type in a normal document format. IPyth....
Release Date 2014/11 -
A Primer on Corporate Governance
Author Fernando A. Tejerina-Gaite , Felix J. Lopez-Iturriaga
Spain has a civil law-based legal system, and court decisions are not a source of law but are of interpretative value. The privatization of large state-owned firms, liberalization, integration with the European Union, and the launch of the euro have all contributed ....
Release Date 2014/09 -
Advanced Case Management with IBM Case Manager
Author Guillermo Rios , Juan Felipe Ospina , Seema Meena , Mike Marin , Johnson Liu , Bob Ja
Organizations face case management challenges that require insight, responsiveness, and collaboration. IBM® Case Manager, Version 5.2, is an advanced case management product that unites information, process, and people to provide the 360-degree view of case informat....
Release Date 2014/06 -
Mastering Python Regular Expressions
Author Víctor Romero , Félix López
For Python developers, this concise and down-to-earth guide to regular expressions is all you need to gain vital new knowledge. From a theoretical overview to Python specifics, it explains everything in crystal clear language.In DetailRegular expressions are used by....
Release Date 2014/02 -
Subsystem and Transaction Monitoring and Tuning with DB2 11 for z/OS
Author Yasuhiro Ohmori , Cathy Drummond , Adrian Burke , Felipe Bortoletto , Paolo Bruni
This IBM® Redbooks® publication discusses in detail the facilities of DB2® for z/OS®, which allow complete monitoring of a DB2 environment. It focuses on the use of the DB2 instrumentation facility component (IFC) to provide monitoring of DB2 data and events and inc....
Release Date 2014/02 -
DB2 11 for z/OS Technical Overview
Author Cristian Molaro , Glenn McGeoch , Sabine Kaschta , Ravikumar Kalyanasundaram , Felip
IBM® DB2® Version 11.1 for z/OS® (DB2 11 for z/OS or just DB2 11 throughout this book) is the fifteenth release of DB2 for IBM MVS™. It brings performance and synergy with the IBM System z® hardware and opportunities to drive business value in the following areas.DB....
Release Date 2013/12 -
Author Patrick Felicia
Learn how to use Unity by creating your very own 'Outbreak' survival game while developing your essential skills Use basic AI techniques to bring your game to lifeLearn how to use Mecanim; create states and manage them through scriptingUse scripting to manage th....
Release Date 2013/08 -
Culture and Leadership Across the World
Author Robert J. House , Felix C. Brodbeck , Jagdeep S. Chhokar
Culture and Leadership Across the World: The GLOBE Book of In-Depth Studies of 25 Societies is the second major publication of GLOBE (Global Leadership and Organizational Behavior Effectiveness), a groundbreaking, large-scale project on international management rese....
Release Date 2013/06 -
JUnit in Action, Second Edition
Author Gary Gregory , Vincent Massol , Felipe Leme , Petar Tahchiev
When JUnit was first introduced a decade ago by Kent Beck and Erich Gamma, the Agile movement was in its infancy, "Test Driven Development" was unknown, and unit testing was just starting to move into the typical developer's vocabulary. Today, most developers ackn....
Release Date 2010/07 -
Cyber Crime Fighters: Tales from the Trenches
Author Kristyn Bernier , Felicia Donovan
“Cyber Crime Fighters: Tales from the Trenches offers one of the most insightful views of the latest criminal threats to the public: cyber crime. This book provides a good primer on how your personal information can be easily obtained by some of the folks you least ....
Release Date 2008/12 -
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Second Edition
Author Gerardo Richarte , Felix FX Lindner , John Heasman , Chris Anley
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that h....
Release Date 2007/08