Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Association Rule Mining: Models and Algorithms (Lecture Notes in Computer Science)
Association Rule Mining: Models and Algorithms (Lecture Notes in Computer Science)

Due to the popularity of knowledge discovery and data mining, in practice as well as among academic and corporate R&D professionals, association rule mining is receiving increasing attention.
The authors present the recent progress achieved in mining quantitative association rules, causal rules, exceptional rules, negative
...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Encyclopedia of Information Science and Technology, Fourth Edition
Encyclopedia of Information Science and Technology, Fourth Edition

In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing...

Neural Networks in Finance : Gaining Predictive Edge in the Market (Advanced Finance Series)
Neural Networks in Finance : Gaining Predictive Edge in the Market (Advanced Finance Series)
"This book clarifies many of the mysteries of Neural Networks and related optimization techniques for researchers in both economics and finance. It contains many practical examples backed up with computer programs for readers to explore. I recommend it to anyone who wants to understand methods used in nonlinear forecasting."
Blake
...
Time Mastery: How Temporal Intelligence Will Make You A Stronger, More Effective Leader
Time Mastery: How Temporal Intelligence Will Make You A Stronger, More Effective Leader
"To be most effective, leaders must move beyond time management to time mastery. Time managers are reliant on clocks and calendars; time masters develop an intuitive sense of timing. Time managers see time as a fixed, rigid constant; time masters view it as relative and malleable. Time masters have what John Clemens and Scott Dalrymple call...
Professional Java for Web Applications
Professional Java for Web Applications

The comprehensive Wrox guide for creating Java web applications for the enterprise

This guide shows Java software developers and software engineers how to build complex web applications in an enterprise environment. You'll begin with an introduction to the Java Enterprise Edition and the basic web application, then set...

The McKinsey Mind: Understanding and Implementing the Problem-Solving Tools and Management Techniques
The McKinsey Mind: Understanding and Implementing the Problem-Solving Tools and Management Techniques

The First Step-by-Step Manual for Achieving McKinsey-Style Solutions­­and Success

International bestseller The McKinsey Way provided a through-the-keyhole look at McKinsey & Co., history's most prestigious consulting firm. Now, the follow-up implementation manual, The McKinsey Mind,...

Corporate Accounting Information Systems
Corporate Accounting Information Systems

We live in a world dominated almost exclusively by flows of knowledge and information - by technologies designed to not only sustain but also increase the socio-economic need and desire for more and more information. This book offers a unique insight into the nature, role and context of accounting related information within the...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Result Page: 99 98 97 96 95 94 93 92 91 90 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy