Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics
Practical Data Wrangling: Expert techniques for transforming your raw data into a valuable source for analytics

Key Features

  • This easy-to-follow guide takes you through every step of the data wrangling process in the best possible way
  • Work with different types of datasets, and reshape the layout of your data to make it easier for analysis
  • Get simple examples and real-life data...
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

Windows Sysinternals Administrator's Reference
Windows Sysinternals Administrator's Reference

The Sysinternals Suite is a set of over 70 advanced diagnostic and troubleshooting utilities for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. Since Microsoft’s acquisition of Sysinternals in 2006, these utilities have been available for free download from...

Power Plant Engineering
Power Plant Engineering

There have been significant developments and advances in the field of power plant engineering, computer applications on energy audit and management, environmental audit and management, human development and environment. The authors have been encouraged to write this pioneer book for the benefit of students of engineering and researchers due...

CISA Certified Information Systems Auditor All-in-One Exam Guide
CISA Certified Information Systems Auditor All-in-One Exam Guide

"All-in-One is All You Need."

CISA Certified Information Systems Auditor All in One Exam Guide

Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this...

Pro SQL Server 2012 Reporting Services (Professional Apress)
Pro SQL Server 2012 Reporting Services (Professional Apress)

At its core, the process of designing reports hasn’t changed substantially in the past 20 years. The report designer lays out report objects, which contain data from a known source of data, in a design application such as Reporting Services, Business Objects Reports, or Microsoft Access. He or she then tests report execution,...

Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits. What do you do?

Simple. You follow your business continuity/disaster recovery plan. If you've prepared in advance, your operation or your company can continue to conduct business while...

Learning Puppet Security
Learning Puppet Security

Secure your IT environments with the powerful security tools of Puppet

About This Book

  • Pass a compliance audit by showing the concrete state of your systems using Puppet
  • Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Essential Excel 2016: A Step-by-Step Guide
Essential Excel 2016: A Step-by-Step Guide
This book shows you how easy it is to create, edit, sort, analyze, summarize and format data as well as graph it. Loaded with screen shots, step-by-step instructions, and reader exercises, Essential Excel 2016 makes it easy for you to get to grips with this powerful software and what it can do.


Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy