Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...
Hadoop Real World Solutions Cookbook
Ever felt you could use some no-nonsense, practical help when developing applications with Hadoop? Well, you've just found it. This real-world solutions cookbook is packed with handy recipes you can apply to your own everyday issues.
Solutions to common problems when working in the Hadoop...
The Theory of Differential Equations: Classical & Qualitative
Differential equations first appeared in the late seventeenth century in the work of Isaac Newton, Gottfried Wilhelm Leibniz, and the Bernoulli brothers, Jakob and Johann. They occurred as a natural consequence of the efforts of these great scientists to apply the new ideas of the calculus to certain problems in mechanics, such as the paths of...
|Result Page: 15 14 13 12 11 10 9 8 7 6 |