Capturing and extracting information is one of the most important tasks a developer can perform, and making this task more engaging without relying entirely on specialized tools is an efficient way to improve productivity. In Data Capture and Extraction with C# Succinctly, author Ed Freitas guides readers towards getting more out of C# in minimal time.
Download Latest Free Computer Books
An Apache open source project, Hadoop stores huge amounts of data in safe, reliable storage and runs complex queries over data in an efficient way. It is at the core of a whole host of the most popular Big Data tools. Mastering Hadoop ensures you get the best out of all these tools and better insight from your data. Hadoop Succinctly explains how Hadoop works, what goes on in the cluster, demonstrates how to move data in and out of Hadoop, and how to query it efficiently
James McCaffrey’s SciPy Programming Succinctly offers readers a quick, thorough grounding in knowledge of the Python open source extension SciPy. The SciPy library, accompanied by its interdependent NumPy, offers Python programmers advanced functions that work with arrays and matrices. Each section presents a complete demo program for programmers to experiment with, carefully chosen examples to best illustrate each function, and resources for further learning.
Microsoft Azure Essentials: Fundamentals of Azure, Second Edition covers the fundamentals of Azure you need to start developing solutions right away. It concentrates on the features of the Azure platform that you are most likely to need to know rather than on every feature and service available on the platform. This book also provides several walkthroughs you can follow to learn how to create VMs and virtual networks, websites and storage accounts, and so on. In many cases, real-world tips are included to help you get the most out of your Azure experience.
Hive allows you to take data in Hadoop, apply a fixed external schema, and query the data with an SQL-like language. With Hive, complex queries can yield simpler, more effectively visualized results. Author Elton Stoneman uses Hive Succinctly to introduce the core principles of Hive and guides readers through mapping Hadoop and HBase data in Hive, writing complex queries in HiveQL, and running custom code inside Hive queries using a variety of languages.
Written for the IT professional and business owner, Office 365: Migrating and Managing Your Business in the Cloud provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. It’s a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration are included. This is an ApressOpen title.
ApressOpen book Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in technical computing applications.
With all the people in the world who have only access to a smartphone but not a PC or a keyboard, creating a programming environment for developing in that environment became a reality with TouchDevelop from Microsoft Research. This ApressOpen book TouchDevelop Programming on the Go 3rd Edition is meant to be a handy reference to this unique programming environment.
This ApressOpen book Managing Risk and Information Security: Protect to Enable describes the changing risk environment and why a fresh approach to information security is needed. The book discusses business risk from a broad perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
ApressOpen title Managing Risk and Information Security: Protect to Enable, 2nd Edition provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed.