Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Microsoft Tabular Modeling Cookbook
Microsoft Tabular Modeling Cookbook

No prior knowledgeof tabular modeling is needed to benefit from this brilliant cookbook. This is the total guide to developing and managing analytical models using the Business Intelligence Semantic Models technology.

Overview

  • Develop tabular models for personal use
  • Learn about the modeling...
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.

...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
Use this practical, step-by-step guide on lean agile strategy to harness technological disruption at your large business to successfully advance your business rather than suffer a loss of business. The lean agile enterprise concept is demystified and translated into action as the author shares his experience with both success and major...
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R

Get command of your organizational Big Data using the power of data science and analytics

Key Features

  • A perfect companion to boost your Big Data storing, processing, analyzing skills to help you take informed business decisions
  • Work with the best tools such as Apache...
Beginning Entity Framework Core 2.0: Database Access from .NET
Beginning Entity Framework Core 2.0: Database Access from .NET
Use the valuable Entity Framework Core 2.0 tool in ASP.NET and the .NET Framework to eliminate the tedium around accessing databases and the data they contain.

Entity Framework Core 2.0 greatly simplifies access to relational databases such as SQL Server that are commonly deployed in corporate settings. By
...
Data Merge and Styles for Adobe InDesign CC 2018: Creating Custom Documents for Mailouts and Presentation Packages
Data Merge and Styles for Adobe InDesign CC 2018: Creating Custom Documents for Mailouts and Presentation Packages
Harness the power of Adobe InDesign's data merge and style panel. Whether you're creating custom mail-outs or other mail-merge needs, familiarize yourself with this powerful InDesign panel in this in-depth, step-by-step guide. This book shows you how to easily create, edit, and print data merged documents that match...
Practical PowerPivot & DAX Formulas for Excel 2010
Practical PowerPivot & DAX Formulas for Excel 2010

PowerPivot: What a name! Or I should really say what’s in a name? Powerful Pivoting? Pivot-table for power users?

PowerPivot is a lot more than that. When I started the PowerPivot project back in 2007, along with Amir Netz (Microsoft BI Distinguished Engineer), the incubation project was called BI Sandbox. We had been looking...

Result Page: 100 99 98 97 96 95 94 93 92 91 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy