Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)
SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)

What makes this book unique is how easy it makes it for you to learn. The author brings you a guide that takes you through a natural sequence of lessons, step-by-step, carefully explaining each concept and staying away from unnecessary technical jargon whilst defining the terms you need to learn. This one-step-at-a-time approach allows anyone...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

Python Geospatial Analysis Cookbook
Python Geospatial Analysis Cookbook

Over 60 recipes to work with topology, overlays, indoor routing, and web application analysis with Python

About This Book

  • Explore the practical process of using geospatial analysis to solve simple to complex problems with reusable recipes
  • Concise step-by-step instructions to teach you...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

The Build Master: Microsoft's Software Configuration Management Best Practices
The Build Master: Microsoft's Software Configuration Management Best Practices

The first best-practice, start-to-finish guide for the software build process

Managing builds is crucial to the profitable delivery of high-quality software; however, the build process has been one of the least-understood stages of the entire development lifecycle....

Game Design Workshop: Designing, Prototyping, Playtesting Games
Game Design Workshop: Designing, Prototyping, Playtesting Games

Master the craft of game design so you can create that elusive combination of challenge, competition, and interaction that players seek. This design workshop begins with an examination of the fundamental elements of game design; then puts you to work in prototyping, playtesting, and redesigning your own games with exercises that teach essential...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web...
Understand Data Mining
Understand Data Mining

Data mining is definitely not a piece of cake. There are those who spend years in the specialization of this particular field in order to operate businesses smoothly. Are you looking for a data mining course? You too, have the ability and the means to learn all the tricks that go into data mining. This book has been specifically written for...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy