Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Those Who Come After: Postmemory, Acknowledgement and Forgiveness (Studies in the Psychosocial)
Those Who Come After: Postmemory, Acknowledgement and Forgiveness (Studies in the Psychosocial)

This book explores the legacies of suffering in relation to ‘those who come after’ – the descendants of victims, survivors and perpetrators of traumatic events. It draws on recent discussions of ‘postmemory’ and ‘haunting’ that are concerned mainly with the transgenerational impact of...

Supporting People with Dementia Using Pervasive Health Technologies (Advanced Information and Knowledge Processing)
Supporting People with Dementia Using Pervasive Health Technologies (Advanced Information and Knowledge Processing)

Information and communication technologies can provide new paradigms in healthcare provision. In particular, new Pervasive Healthcare technologies can revolutionise the dynamics of healthcare, enabling people to remain at home for longer with lower costs to health and welfare organisations. This book reveals how pervasive healthcare technologies...

Humanity 2.0: What it Means to be Human Past, Present and Future
Humanity 2.0: What it Means to be Human Past, Present and Future
Social thinkers in all fields are faced with one unavoidable question: what does it mean to be 'human' in the 21st century? As definitions between what is 'animal' and what is 'human' break down, and as emerging technologies such as artificial intelligence and nano- and bio- technologies develop, accepted...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Applied Deep Learning with Python: Use scikit-learn, TensorFlow, and Keras to create intelligent systems and machine learning solutions
Applied Deep Learning with Python: Use scikit-learn, TensorFlow, and Keras to create intelligent systems and machine learning solutions

A hands-on guide to deep learning that's filled with intuitive explanations and engaging practical examples

Key Features

  • Designed to iteratively develop the skills of Python users who don't have a data science background
  • Covers the key foundational concepts...
Business Process Outsourcing: The Competitive Advantage
Business Process Outsourcing: The Competitive Advantage
Business Process Outsourcing (BPO) is becoming the new revolution as company's of all sizes are seeking to take advantage of this source of competitive advantage.

This book provides a step-by-step approach to understanding the application of Business Process Outsourcing, assessing the BPO opportunity in the company, and then managing
...
Instant Metasploit Starter
Instant Metasploit Starter

The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.

This book is written in such a way that...

Principles of Big Data: Preparing, Sharing, and Analyzing Complex Information
Principles of Big Data: Preparing, Sharing, and Analyzing Complex Information

Principles of Big Data helps readers avoid the common mistakes that endanger all Big Data projects. By stressing simple, fundamental concepts, this book teaches readers how to organize large volumes of complex data, and how to achieve data permanence when the content of the data is constantly changing. General methods for data...

Principles of Network and System Administration
Principles of Network and System Administration
Burgess fine book … is a well-articulated introduction to a corpus of guiding principles for systems administrators … I consider this an important book … I think that Burgess will become part of the required reading for future (and current) systems administrators. Peter Salus, Usenix Association Features
Security and Privacy in Biometrics
Security and Privacy in Biometrics

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and...

Data Mining Applications for Empowering Knowledge Societies
Data Mining Applications for Empowering Knowledge Societies
Data Mining techniques are gradually becoming essential components of corporate intelligence systems and progressively evolving into a pervasive technology within activities that range from the utilization of historical data to predicting the success of an awareness campaign. In reality, data mining is becoming an interdisciplinary field driven by...
Joomla! Web Security
Joomla! Web Security
In Detail

Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy