Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

SmartWatch Design Fundamentals: WatchFace Design for Samsung Galaxy SmartWatches
SmartWatch Design Fundamentals: WatchFace Design for Samsung Galaxy SmartWatches
Gain concepts central to smartwatch design, editing and animation correction using the popular open source Galaxy Watch Designer software package. This visual guide builds upon the essential concepts of smartwatch design, decoration, digital imaging, animation, function integration, and visual effects, and gets more advanced as chapters...
The Average Consumer in Confusion-based Disputes in European Trademark Law and Similar Fictions
The Average Consumer in Confusion-based Disputes in European Trademark Law and Similar Fictions

This book contends that, with regard to the likelihood of confusion standard, European trademark law applies the average consumer incoherently and inconsistently. To test this proposal, it presents an analysis of the horizontal and vertical level of harmonization of the average consumer. The horizontal part focuses on similar...

Python for Finance
Python for Finance

If your interest is finance and trading, then using Python to build a financial calculator makes absolute sense. As does this book which is a hands-on guide covering everything from option theory to time series.

Overview

  • Estimate market risk, form various portfolios, and estimate their variance-covariance...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17

High-end game development with advanced C++ 17 programming techniques

Key Features

  • Make the best use of object-oriented capabilities of C++ to develop high-end games
  • Create reusable C++ libraries and editor tools for your game
  • Series of example projects...
Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)
Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)

Praise for Handbook of Exchange Rates

“This book is remarkable. I expect it to become the anchor reference for people working in the foreign exchange field.”

—Richard K. Lyons, Dean and Professor of Finance, Haas School of Business, University of California...

Game Theory: An Introduction
Game Theory: An Introduction

An exciting new edition of the popular introduction to game theory and its applications

The thoroughly expanded Second Edition presents a unique, hands-on approach to game theory. While most books on the subject are too abstract or too basic for mathematicians, Game Theory: An Introduction, Second...

Heuristic and Optimization for Knowledge Discovery
Heuristic and Optimization for Knowledge Discovery
With the large amount of data stored by many organizations, capitalists have observed that this information is an intangible asset. Unfortunately, handling large databases is a very complex process and traditional learning techniques are expensive to use. Heuristic techniques provide much help in this arena, although little is known about heuristic...
Software Architecture in Practice, Second Edition
Software Architecture in Practice, Second Edition

This award-winning book, substantially updated to reflect the latest developments in the field, introduces the concepts and best practices of software architecture-how a software system is structured and how that system's elements are meant to interact. Distinct from the details of implementation, algorithm, and data...

The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
Rails, Angular, Postgres, and Bootstrap: Powerful, Effective, and Efficient Full-Stack Web Development
Rails, Angular, Postgres, and Bootstrap: Powerful, Effective, and Efficient Full-Stack Web Development

As a Rails developer, you care about user experience and performance, but you also want simple and maintainable code. Achieve all that by embracing the full stack of web development, from styling with Bootstrap, building an interactive user interface with AngularJS, to storing data quickly and reliably in PostgreSQL. Take a holistic view of...

Result Page: 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy