Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark

Microsoft Azure has over 20 platform-as-a-service (PaaS) offerings that can act in support of a big data analytics solution. So which one is right for your project? This practical book helps you understand the breadth of Azure services by organizing them into a reference framework you can use when crafting your own big data analytics...

Hands-On Data Structures and Algorithms with Python: Write complex and powerful code using the latest features of Python 3.7, 2nd Edition
Hands-On Data Structures and Algorithms with Python: Write complex and powerful code using the latest features of Python 3.7, 2nd Edition

Learn to implement complex data structures and algorithms using Python

Key Features

  • Understand the analysis and design of fundamental Python data structures
  • Explore advanced Python concepts such as Big O notation and dynamic programming
  • Learn functional...
Natural Language Processing with Python
Natural Language Processing with Python
This book offers a highly accessible introduction to Natural Language Processing, the field that underpins a variety of language technologies, ranging from predictive text and email filtering to automatic summarization and translation. With Natural Language Processing with Python, you'll learn how to write Python programs to work with large...
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

The Brain from Inside Out
The Brain from Inside Out
Is there a right way to study how the brain works? Following the empiricist's tradition, the most common approach involves the study of neural reactions to stimuli presented by an experimenter. This 'outside-in' method fueled a generation of brain research and now must confront hidden
assumptions about causation and
...
JavaScript Demystified
JavaScript Demystified

Every web surfer knows a classy web site when he sees one, because it has eyecatching features that make the site outstanding among other sites on the web.

Developers of these sites leave web surfers in awe not by using fancy animation or provocative pictures, but by using subtle tricks such as fl oating menus and moveable
...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
Programming Microsoft Dynamics NAV 2009
Programming Microsoft Dynamics NAV 2009
Microsoft Dynamics NAV is a well established Enterprise Resource Planning (ERP) application, part of the Microsoft Dynamics family. Dynamics NAV is installed worldwide, with well over one million users. Version 2009 contains many major new features and structures, requiring even experienced Dynamics NAV developers to refresh their NAV development...
The Truth About Being a Leader
The Truth About Being a Leader

Praise for The Truth About Being a Leader

“If you ever met Dr. Otazo, you certainly would read her new Truth book. She is as she writes—engaging, pithy, memorable. Take ‘Truth 33: Questions Unite; Answers Divide.’ Now ain’t that the truth....

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy