Web mining aims to discover useful information and knowledge from the Web hyperlink structure, page contents, and usage data. Although Web mining uses many conventional data mining techniques, it is not purely an application of traditional data mining due to the semistructured and unstructured nature of the Web data and its heterogeneity. It has also developed many of its own algorithms and techniques. Liu has written a comprehensive text on Web data mining. Key topics of structure mining, content mining, and usage mining are covered both in breadth and in depth. His book brings together all the essential concepts and algorithms from related areas such as data mining, machine learning, and text processing to form an authoritative and coherent text. The book offers a rich blend of theory and practice, addressing seminal research ideas, as well as examining the technology from a practical point of view. It is suitable for students, researchers and practitioners interested in Web mining both as a learning text and a reference book. Lecturers can readily use it for classes on data mining, Web mining, and Web search. Additional teaching materials such as lecture slides, datasets, and implemented algorithms are available online.
'Tweets and the Streets' analyses the culture of the new protest movements of the 21st century. From the Arab Spring to the 'indignados' protests in Spain and the Occupy movement, Paolo Gerbaudo examines the relationship between the rise of social media and the emergence of new forms of protest. Gerbaudo argues that activists' use of Twitter and Facebook does not fit with the image of a 'cyberspace' detached from physical reality. Instead, social media is used as part of a project of re-appropriation of public space, which involves the assembling of different groups around 'occupied' places such as Cairo’s Tahrir Square or New York’s Zuccotti Park. An exciting and invigorating journey through the new politics of dissent, Tweets and the Streets points both to the creative possibilities and to the risks of political evanescence which new media brings to the contemporary protest experience.
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team.
But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace—more sophisticated than any virus seen before—has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.
Continue reading “Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2)”
This pocket guide is the perfect on-the-job companion to Git, the distributed version control system. It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.
Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks
E-Mail Hacking for IT Security Professionals enables both penetration testers and security professionals to plan and execute better testing of e-mail solutions.
Unlike most 'hacking' books, this guide covers all aspects of testing e-mail covering the scope of testing, expectations, policy and process reviews, design, strategy, implementation, operational support, third party managed services and more.
Continue reading “E-mail Hacking for IT Security Professionals (HackerStorm Penetration Testing Guides Book 2)”