Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Network and System Security, Second Edition
Network and System Security, Second Edition

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of...

Managing the Matrix: The Secret to Surviving and Thriving in Your Organization
Managing the Matrix: The Secret to Surviving and Thriving in Your Organization

A comprehensive guide to excelling in a complex matrix organization

Debra was not in a good mood as she entered Johann’s office for their third meeting. One of her colleagues had just been promoted and, although the guy who got it was good, she didn’t think he was any better than her. Well, except at one...

Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Learning Agile is a comprehensive guide to the most popular agile methods, written in a light and engaging style that makes it easy for you to learn.

Agile has revolutionized the way teams approach software development, but with dozens of agile methodologies to choose from, the decision to "go agile"
...
Realtime Data Mining: Self-Learning Techniques for Recommendation Engines (Applied and Numerical Harmonic Analysis)
Realtime Data Mining: Self-Learning Techniques for Recommendation Engines (Applied and Numerical Harmonic Analysis)

​​​​Describing novel mathematical concepts for recommendation engines, Realtime Data Mining: Self-Learning Techniques for Recommendation Engines features a sound mathematical framework unifying approaches based on control and learning theories, tensor factorization, and hierarchical methods. Furthermore, it...

Object-Oriented User Interfaces for Personalized Mobile Learning (Intelligent Systems Reference Library)
Object-Oriented User Interfaces for Personalized Mobile Learning (Intelligent Systems Reference Library)

This book presents recent research in mobile learning and advanced user interfaces. It is shown how the combination of these fields can result in personalized educational software that meets the requirements of state-of-the-art mobile learning software. This book provides a framework that is capable of incorporating the software technologies,...

Machine Learning with Spark - Tackle Big Data with Powerful Spark Machine Learning Algorithms
Machine Learning with Spark - Tackle Big Data with Powerful Spark Machine Learning Algorithms

Key Features

  • Follow real-world examples to learn how to develop your own machine learning systems with Spark
  • A practical tutorial with real-world use cases allowing you to develop your own machine learning systems with Spark
  • Combine various techniques and models into an intelligent machine...
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Android Security Internals: An In-Depth Guide to Android's Security Architecture

"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf."—Jon "jcase" Sawyer, from the Foreword

...
Handbook on Business Process Management 2: Strategic Alignment, Governance, People and Culture (International Handbooks on Information Systems)
Handbook on Business Process Management 2: Strategic Alignment, Governance, People and Culture (International Handbooks on Information Systems)

Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of...

Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)
Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)

An expert guide to selecting the right cloud service model for your business

Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for...

Predictive Analytics For Dummies
Predictive Analytics For Dummies

Combine business sense, statistics, and computers in a new and intuitive way, thanks to Big Data Predictive analytics is a branch of data mining that helps predict probabilities and trends. Predictive Analytics For Dummies explores the power of predictive analytics and how you can use it to make valuable predictions for your business, or in...

Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy