Social network analysis, which focuses on relationships among social entities, is used widely in the social and behavioral sciences, as well as in economics, marketing, and industrial engineering. Social Network Analysis: Methods and Applications reviews and discusses methods for the analysis of social networks with a focus on applications of these methods to many substantive examples. As the first book to provide a comprehensive coverage of the methodology and applications of the field, this study is both a reference book and a textbook.
Model a Thermal System without Lengthy Hand Calculations Before components are purchased and a thermal energy system is built, the effective engineer must first solve the equations representing the mathematical model of the system. Having a working mathematical model based on physics and equipment performance information is crucial to finding a system’s operating point. Thermal Energy Systems: Design and Analysis offers a fundamental working knowledge of the analysis and design of thermal-fluid energy systems, enabling users to effectively formulate, optimize, and test their own design pr... [Read More]
Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware... [Read More]
When a pseudonymous programmer introduced “a new electronic cash system that’s fully peer-to-peer, with no trusted third party” to a small online mailing list in 2008, very few paid attention. Ten years later, and against all odds, this upstart autonomous decentralized software offers an unstoppable and globally-accessible hard money alternative to modern central banks. The Bitcoin Standard analyzes the historical context to the rise of Bitcoin, the economic properties that have allowed it to grow quickly, and its likely economic, political, and social implications. While Bitcoin is a ne... [Read More]
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You'll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet l... [Read More]
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network?Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You’ll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a packet ma... [Read More]
★★ Buy the Paperback Version of this Book and get the Kindle Book version for FREE ★★Are you aware of the fact that the world of Innovation is rapidly changing? Are you interested in learning more about Machine Learning, Python Machine Learning and Python Programming? If you want to keep pace with Innovation then keep reading…This guidebook is going to help you go from beginner to a professional in Python coding language in no time. When you are interested in learning more about what machine learning is all about, as well as how you can use a part of the coding from Python insid... [Read More]
A technological overview of LTE and WiMAX LTE, WiMAX and WLAN Network Design, Optimization and Performance Analysis provides a practical guide to LTE and WiMAX technologies introducing various tools and concepts used within. In addition, topics such as traffic modelling of IP-centric networks, RF propagation, fading, mobility, and indoor coverage are explored; new techniques which increase throughput such as MIMO and AAS technology are highlighted; and simulation, network design and performance analysis are also examined. Finally, in the latter part of the book Korowajczuk gives a step-by-step... [Read More]
Volume of the Business Analysis Essential Library Series Getting It Right: Business Requirement Analysis Tools and Techniques, presents principles and practices for effective requirements analysis and specification, and a broad overview of the requirements analysis and specification processes. This critical reference is designed to help the business analyst decide which requirement artifacts should be produced to adequately analyze requirements. Examine the complete spectrum of business requirement analysis from preparation through documentation. Learn the steps in the analysis and specificati... [Read More]
Net Zero Energy Buildings (NZEB): Concepts, Frameworks and Roadmap for Project Analysis and Implementation provides readers with the elements they need to understand, combine and contextualize design decisions on Net Zero Energy Buildings. The book is based on learned lessons from NZEB design, construction, operation that are integrated to bring the most relevant topics, such as multidisciplinarity, climate sensitivity, comfort requirements, carbon footprints, construction quality and evidence-based design. Chapters introduce the context of high performance buildings, present overviews of NZEB... [Read More]
If you’ve ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you?In Automate the Boring Stuff with Python, you’ll learn how to use Python to write programs that do in minutes what would take you hours to do by hand—no prior programming experience required. Once you’ve mastered the basics of programming, you’ll create Python programs that effortlessly perform useful and impressive feats of automation to:–Search for text in a file or across multiple files–Creat... [Read More]
Confusing Textbooks? Missed Lectures? Not Enough Time? Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills. This Schaum's Outline gives you Practice problems with full explanations that reinforce knowledge Coverage of the mo... [Read More]
The overwhelming majority of a software system’s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google’s Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You’ll learn the principles and practices that enable Google engi... [Read More]
Essay from the year 2006 in the subject Information Management, grade: 1,3, University of Cologne (Lehrstuhl für Wirtschaftsinformatik, insb. Informationsmanagement), 12 entries in the bibliography, language: English, abstract: Journal databases provide an easy access to
Social networks provide a powerful abstraction of the structure and dynamics of people-to-technology interaction. Comparing social animal interaction with web-based social interaction, this volume explores human behavior in web-based social
This book provides the insights required to effectively respond to counterfeit trade. It constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel management tools, and product protection
© 10Toply.com - all rights reserved - Sitemap 10Toply.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com