Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Data Science: Innovative Developments in Data Analysis and Clustering (Studies in Classification, Data Analysis, and Knowledge Organization)
Data Science: Innovative Developments in Data Analysis and Clustering (Studies in Classification, Data Analysis, and Knowledge Organization)

This edited volume on the latest advances in data science covers a wide range of topics in the context of data analysis and classification. In particular, it includes contributions on classification methods for high-dimensional data, clustering methods, multivariate statistical methods, and various applications. The book gathers a selection...

The Data Science Design Manual (Texts in Computer Science)
The Data Science Design Manual (Texts in Computer Science)

This engaging and clearly written textbook/reference provides a must-have introduction to the rapidly emerging interdisciplinary field of data science. It focuses on the principles fundamental to becoming a good data scientist and the key skills needed to build systems for collecting, analyzing, and interpreting data.

The...

Design and Control of Workflow Processes: Business Process Management for the Service Industry (Lecture Notes in Computer Science)
Design and Control of Workflow Processes: Business Process Management for the Service Industry (Lecture Notes in Computer Science)

The motivation behind the conception of this monograph was to advance scientific knowledge about the design and control of workflow processes. A workflow pr- ess (or workflow for short) is a specific type of business process, a way of or- nizing work and resources. Workflows are commonly found within large admin- trative organizations such as...

Infrastructure Public-Private Partnerships: Decision, Management and Development
Infrastructure Public-Private Partnerships: Decision, Management and Development

Economic development and social welfare depend on the existence of effective and efficient infrastructure systems, particularly in health, energy, transportation and water, many of which are developed and managed through Public-Private Partnerships (PPPs). However, empirical evidence suggests some pitfalls in the use of these PPP...

Measurement, Modeling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
Measurement, Modeling, and Evaluation of Computing Systems and Dependability and Fault Tolerance

This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing Systems and Dependability and Fault Tolerance, MMB & DFT 2012, held in Kaiserslautern, Germany, in March 2012.

The 16 revised full papers presented together with 5 tool papers and 5...

The American Monetary System: An Insider's View of Financial Institutions, Markets and Monetary Policy
The American Monetary System: An Insider's View of Financial Institutions, Markets and Monetary Policy

Today’s financial system is considerably more complex than in years past, as new financial instruments have been introduced that are not well understood even by the people and institutions that invest in them. Numerous high-risk opportunities are available, and the number of people who unwittingly wander into such ventures seems to grow...

Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies
Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies

With their intuitive graphical approach and expressive analysis techniques, Petri nets are suitable for a wide range of applications and teaching scenarios, and they have gained wide acceptance as a modeling technique in areas such as software design and control engineering. The core theoretical principles have been studied for many decades...

Protocol Engineering
Protocol Engineering

Communication protocols form the operational basis of computer networks and tele­communication systems. They are behavior conventions that describe how com­munication systems inter­act with each other, defining the temporal order of the interactions and the formats of the data units exchanged – essentially they determine the...

Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors
Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors

This book is an introduction to the theories of Special and General Relativity. The target audience are physicists, engineers and applied scientists who are looking for an understandable introduction to the topic - without too much new mathematics. The fundamental equations of Einstein's theory of Special and General Relativity are...

Handbook of Global Logistics: Transportation in International Supply Chains
Handbook of Global Logistics: Transportation in International Supply Chains

Global logistics entails tradeoffs in facility location, distribution networks, the routing and scheduling of deliveries by different modes of travel (e.g., air, water, truck, rail), procurement, and the overall management of international supply chains. In an increasingly global economy, then, logistics has become a very important matter in...

Practice-Based Innovation: Insights, Applications and Policy Implications
Practice-Based Innovation: Insights, Applications and Policy Implications

The book describes and analyses the new environment for innovation, it does this with an emphasis on yet uncharted regions within the field of practice-based innovation, coming up with guidelines for innovation policy measures needed in order to realise this. While it focuses on these policies it also takes into account multi-actor innovation...

unlimited object storage image
Result Page: 463 462 461 460 459 458 457 456 455 454 453 452 451 450 449 448 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy