Security Log Management: Identifying Patterns in the ChaosLogs, logs, logs. Ever since I started taking my first steps in the world of security, it has been clear that “the log” plays a crucial—and sometimes undervalued— role in the security management of any IT infrastructure.This fact alone explains the plethora of tools, applications, and solutions whose only... | | Learning Data Mining with Python
Harness the power of Python to analyze data and create insightful predictive models
About This Book
-
Learn data mining in practical terms, using a wide variety of libraries and techniques
-
Learn how to find, manipulate, and analyze data using Python
-
Step-by-step instructions...
| | Professional Apache Tomcat 5 (Programmer to Programmer)The Apache Tomcat server and related technologies give Java™ developers a rich set of tools to quickly build more sophisticated Web applications. Tomcat version 5 supports the latest JSP™ and Servlet specifications, JSP 2.0, and Servlets 2.4. This completely updated volume offers you a thorough education in Tomcat 5 as well as 4.1.
... |