Home | Amazing | Today | Tags | Publishers | Years | Search 
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Fully updated and expanded!
  • Added steps for Windows 10 and Mac OS X El Capitan
  • Over 30% more material
  • Expanded coverage on mobile device safety
  • Expanded coverage on safety for kids online
Contains well over 100 tips with complete step-by-step
...
Mining Your Own Business in Health Care Using DB2 Intelligent Miner for Data
Mining Your Own Business in Health Care Using DB2 Intelligent Miner for Data
The data you collect about your patients is one of the greatest assets that any business has available. Buried within the data is all sorts of valuable information that could make a significant difference to the way you run your business and interact with your...
Foundations of Corneal Disease: Past, Present and Future
Foundations of Corneal Disease: Past, Present and Future

The field of cornea has seen tremendous advances over the last 40 years?this uniquely comprehensive book will discuss the history of these advances, current best practices in important diseases of the cornea and ocular surface, and examine future directions in diagnosis and management. Written by leading experts, many of whom trained...

Understanding the Role of Business Analytics
Understanding the Role of Business Analytics

This book encompasses empirical evidences to understand the application of data analytical techniques in emerging contexts. Varied studies relating to manufacturing and services sectors including healthcare, banking, information technology, power, education sector etc. stresses upon the systematic approach followed in...

Sensing of Non-Volatile Memory Demystified
Sensing of Non-Volatile Memory Demystified
Research, development, and commercialization of emerging non-volatile memories (NVMs) are being aggressively pursued by the design community to supplement and/or substitute conventional volatile and NV memory technologies that are facing stiff scalability challenges. The emerging NVMs such as Magnetic RAM (MRAM),...
The Media, the Public and the Great Financial Crisis
The Media, the Public and the Great Financial Crisis

This book explores the impact of the print and broadcast media on public knowledge and understanding of the 2008 Great Financial Crisis. It represents the first systemic attempt to analyse how mass media influenced public opinion and political events during this key period in Britain's economic history. To do this, the book...

Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card Research and Advanced Applications Conference (CARDIS 2018), which was held in Montpellier, France, during November 12–14, 2018, and organized by the Montpellier Laboratory of Informatics, Robotics and Microelectronics (LIRMM)....
Decision Science in Action: Theory and Applications of Modern Decision Analytic Optimisation (Asset Analytics)
Decision Science in Action: Theory and Applications of Modern Decision Analytic Optimisation (Asset Analytics)

This book provides essential insights into a range of newly developed numerical optimization techniques with a view to solving real-world problems. Many of these problems can be modeled as nonlinear optimization problems, but due to their complex nature, it is not always possible to solve them using conventional optimization theory....

Collateral Management: A Guide to Mitigating Counterparty Risk (Wiley Finance)
Collateral Management: A Guide to Mitigating Counterparty Risk (Wiley Finance)
Insight into collateral management and its increasing relevance in modern banking

In the wake of recent financial crises, firms of all sizes have adjusted their policies to incorporate more frequent instances of collateral management. Collateral Management: A Guide to Mitigating Counterparty Risk explains the...

Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy