Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
INNOVATION, CULTURE, AND BIG DATA ANALYTICS
 
Ignoring the big data hype and diving right into the value proposition, Big Data, Big Innovation takes a long, hard look at making sure that businesses don't stray off course when chasing innovation. It focuses on real-world goals, strategies...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

A Practical Guide to Data Mining for Business and Industry
A Practical Guide to Data Mining for Business and Industry

Data mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create...

Lean Auditing: Driving Added Value and Efficiency in Internal Audit
Lean Auditing: Driving Added Value and Efficiency in Internal Audit

"How can you argue with the core principles of Lean, that you focuson what provides value to your customer and eliminate work that isnot necessary (muda)? Internal auditors need to understandnot  only who their primary customers are, but what isvaluable to them - which in most cases is assurance that the risksthat matter to the...

Program Management for Improved Business Results
Program Management for Improved Business Results

Superior program management begins with superior information and strategy

Program Management for Improved Business Results, Second Edition is a practical guide to real-world program management, written to align with the rigorous PMI® PgMP® certification standards. The book explains the benchmarks and best...

Android Programming: Pushing the Limits
Android Programming: Pushing the Limits

Unleash the power of the Android OS and build the kinds ofbrilliant, innovative apps users love to use

If you already know your way around the Android OS and can builda simple Android app in under an hour, this book is for you. Ifyou’re itching to see just how far you can push it anddiscover what Android is really...

Introduction to Pragmatics
Introduction to Pragmatics

Introduction to Pragmatics guides students throughtraditional and new approaches in the field, focusing particularlyon phenomena at the elusive semantics/pragmatics boundary toexplore the role of context in linguistic communication.

  • Offers students an accessible introduction and an up-to-datesurvey of the field,...
Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!
Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!

Building an analysis ecosystem for a smarter approach tointelligence

Keith Carter's Actionable Intelligence: A Guide to DeliveringBusiness Results with Big Data Fast! is the comprehensive guideto achieving the dream that business intelligence practitionershave been chasing since the concept itself came into being....

Constraint Networks: Targeting Simplicity for Techniques and Algorithms
Constraint Networks: Targeting Simplicity for Techniques and Algorithms

A major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research and work in this area, divided into four main topics: representation, inference, search, and...

Formal Methods: Industrial Use from Model to the Code
Formal Methods: Industrial Use from Model to the Code

Although formal analysis programming techniques may be quite old, the introduction of formal methods only dates from the 1980s. These techniques enable us to analyze the behavior of a software application, described in a programming language. It took until the end of the 1990s before formal methods or the B method could be implemented in...

Distibuted Systems: Design and Algorithms
Distibuted Systems: Design and Algorithms

In today’s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems.

Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues.
Distributed Systems:
...

Result Page: 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy