03094nam 2200757Ia 450 991078282800332120230721021144.00-19-960357-X1-282-05336-197866120533680-19-156346-3(CKB)1000000000747119(EBL)431111(OCoLC)326881624(SSID)ssj0001038468(PQKBManifestationID)12439184(PQKBTitleCode)TC0001038468(PQKBWorkID)11049819(PQKB)10099780(SSID)ssj0000187435(PQKBManifestationID)11202338(PQKBTitleCode)TC0000187435(PQKBWorkID)10136337(PQKB)10852683(StDuBDS)EDZ0000072819(MiAaPQ)EBC431111(Au-PeEL)EBL431111(CaPaEBR)ebr10288476(CaONFJC)MIL205336(EXLCZ)99100000000074711920090302d2009 uy 0engur|n|---|||||txtccrKilling in war[electronic resource] /Jefferson McMahanOxford Clarendon Press ;New York Oxford University Press20091 online resource (263 p.)Uehiro series in practical ethicsDescription based upon print version of record.0-19-172104-2 0-19-954866-8 Includes bibliographical references (p. [236]-245) and index.Contents; 1. The Morality of Participation in an Unjust War; 2. Arguments for the Moral Equality of Combatants; 3. Excuses; 4. Liability and the Limits of Self-Defense; 5. Civilian Immunity and Civilian Liability; Notes; IndexJeff McMahan urges us to reject the view, dominant throughout history, that mere participation in an unjust war is not wrong. He argues powerfully that combatants who fight for an unjust cause are acting wrongly and are themselves morally responsible for their actions. We must rethink our attitudes to the moral role of the individual in war. - ;Killing a person is in general among the most seriously wrongful forms of action, yet most of us accept that it can be permissible to kill people on a large scale in war. Does morality become more permissive in a state of war? Jeff McMahan argues that cUehiro series in practical ethics.WarMoral and ethical aspectsCombatMoral and ethical aspectsMilitary ethicsConscientious objectionResponsibilityWarMoral and ethical aspects.CombatMoral and ethical aspects.Military ethics.Conscientious objection.Responsibility.172/.42McMahan Jeff1512692MiAaPQMiAaPQMiAaPQBOOK9910782828003321Killing in war3746755UNINA06298nam 2200625Ia 450 991073539670332120250723200949.09781430257622143025762810.1007/978-1-4302-5762-2(OCoLC)856903015(MiFhGG)GVRL6VTU(CaSebORM)9781430257615(OCoLC)ocn856903015(CKB)3710000000015716(MiAaPQ)EBC1636332(MiFhGG)9781430257622(EXLCZ)99371000000001571620130218d2013 uy 0engurun#---uuuuatxtccrBig data analytics using splunk /Peter Zadrozny, Raghu Kodali1st ed. 2013.Berkeley, CA Apress20131 online resource (xix, 353 pages) illustrations (chiefly color), color mapsThe expert's voice in big dataGale eBooksIncludes index.9781430257615 143025761X ""Contents at a Glance""; ""Contents""; ""About the Authors""; ""About the Technical Reviewer""; ""Acknowledgments""; ""Chapter 1: Big Data and Splunk""; ""What Is Big Data?""; ""Alternate Data Processing Techniques""; ""What Is Splunk?""; ""About This Book""; ""Chapter 2: Getting Data into Splunk""; ""Variety of Data""; ""How Splunk deals with a variety of data""; ""Files & Directories""; ""Data Generator""; ""Generate Sample Data""; ""Network Sources""; ""Windows data""; ""Other Sources""; ""Apps and Add-ons""; ""Forwarders""; ""Summary""; ""Chapter 3: Processing and Analyzing the Data""""Getting to Know Combined Access Log Data""""Searching and Analyzing Indexed Data""; ""Reporting""; ""Which Are the Top Browsers?""; ""Top Five IP Address es""; ""Which Are the Top Referral Web Sites?""; ""How Many Events Have HTTP 404 Status?""; ""How Many Events Have Purchase Action?""; ""List of Products That Are Part of a Purchase""; ""Sorting""; ""Filtering""; ""Adding and Evaluating Fields""; ""Grouping""; ""Summary""; ""Chapter 4: Visualizing the Results""; ""Data Visualization""; ""How Splunk Deals with Visualization""; ""Chart""; ""Chart the Number of GET and POST for Each Host""""Chart the Purchases and Views for Each Product Category""""Which Product Categories Are Affected by HTTP 404 Errors ?""; ""Purchasing Trend for MyGizmoStore.com""; ""Duration of Transactions""; ""Timechart""; ""Top Purchases by Product""; ""Page Views and Purchases""; ""Visualization Using Google Maps App""; ""Globe""; ""Dashboards""; ""Summary""; ""Chapter 5: Defining Alerts""; ""What Are Alerts?""; ""How Splunk Provides Alerts""; ""Alert based on product sales""; ""Alert on failed logins""; ""Alerts on critical errors in log files""; ""Summary""; ""Chapter 6: Web Site Monitoring""""Monitoring web sites""""IT Operations""; ""Business""; ""IT Operations""; ""Hits by host""; ""Hits by host without internal access""; ""Traffic with good HTTP status""; ""Traffic with bad HTTP status""; ""Top pages by bad HTTP status""; ""Business""; ""User demographics by region""; ""Bounce rate""; ""Unique visitors""; ""Summary""; ""Chapter 7: Using Log Files To Create Advanced Analytics""; ""Traditional Analytics""; ""A Paradigm Change""; ""Semantic Logging""; ""Logging Best Practices""; ""Summary""; ""Chapter 8: The Airline On-Time Performance Project""; ""Summary""""Chapter 9: Getting the Flight Data into Splunk""""Working with CSV Files""; ""The Flight Data""; ""Downloading the Data""; ""Getting to Know the Flight Data""; ""Timestamp Considerations""; ""Mapping Fields to a Timestamp""; ""Preprocessing the Flight Data""; ""Modifying the Timestamp Processor""; ""Indexing All the Flight Data""; ""Indexing Data from a Relational Database""; ""Defining a New Database Connection""; ""Database Monitoring""; ""Summary""; ""Chapter 10: Analyzing Airlines, Airports, Flights, and Delays""; ""Analyzing Airlines""; ""Counting Airlines""; ""Visualizing Results""""Analyzing Airports""Big Data Analytics Using Splunk is a hands-on book showing how to process and derive business value from big data in real time. Examples in the book draw from social media sources such as Twitter (tweets) and Foursquare (check-ins). You also learn to draw from machine data, enabling you to analyze, say, web server log files and patterns of user access in real time, as the access is occurring. Gone are the days when you need be caught out by shifting public opinion or sudden changes in customer behavior. Splunk’s easy to use engine helps you recognize and react in real time, as events are occurring. Splunk is a powerful, yet simple analytical tool fast gaining traction in the fields of big data and operational intelligence. Using Splunk, you can monitor data in real time, or mine your data after the fact. Splunk’s stunning visualizations aid in locating the needle of value in a haystack of a data. Geolocation support spreads your data across a map, allowing you to drill down to geographic areas of interest. Alerts can run in the background and trigger to warn you of shifts or events as they are taking place. With Splunk you can immediately recognize and react to changing trends and shifting public opinion as expressed through social media, and to new patterns of eCommerce and customer behavior. The ability to immediately recognize and react to changing trends provides a tremendous advantage in today’s fast-paced world of Internet business. Big Data Analytics Using Splunk opens the door to an exciting world of real-time operational intelligence. Built around hands-on projects Shows how to mine social media Opens the door to real-time operational intelligence.Data miningBusiness intelligenceData mining.Business intelligence.004005.7Zadrozny Peter146493Kodali Raghu R1833981MiAaPQMiAaPQMiAaPQBOOK9910735396703321Big data analytics using splunk4409093UNINA