Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning for Finance: Principles and practice for financial insiders
Machine Learning for Finance: Principles and practice for financial insiders

A guide to advances in machine learning for financial professionals, with working Python code

Key Features

  • Explore advances in machine learning and how to put them to work in financial industries
  • Clear explanation and expert discussion of how machine learning works, with...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
Unity 2017 Game Development Essentials - Third Edition: Build fully functional 2D and 3D games with realistic environments, sounds, physics, special effects, and more!
Unity 2017 Game Development Essentials - Third Edition: Build fully functional 2D and 3D games with realistic environments, sounds, physics, special effects, and more!
Game engines such as Unity are the power tools behind the games we know and love. Unity is one of the most widely used and best loved packages for game development and is used by everyone, from hobbyists to large studios, to create games and interactive experiences for the web, desktops, mobiles, and consoles. With...
Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Dear Mr. Buffett: What An Investor Learns 1,269 Miles From Wall Street
Dear Mr. Buffett: What An Investor Learns 1,269 Miles From Wall Street

Janet Tavakoli takes you into the world of Warren Buffett by way of the recent mortgage meltdown. In correspondence and discussion with him over 2 years, they both saw the writing on the wall, made clear by the implosion of Bear Stearns. Tavakoli, in clear and engaging prose, explains how the credit mess happened beginning with the mortgage...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

151 Quick Ideas to Manage Your Time
151 Quick Ideas to Manage Your Time

Too many of us live our lives trying to shoehorn our many activities and responsibilities into too few time slots available. Increasingly for business people, fathers and mothers, even kids—(ineffectively) managing the myriad of activities has become an all-consuming chore. And we're so stressed that our relationships and job...

Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Rise and Decline of the State
The Rise and Decline of the State
The state, which since the middle of the seventeenth century has been the most important and most characteristic of all moderninstitutions, is in decline. From Western Europe to Africa, either voluntarily or involuntarily, many existing states are either combining into larger communities or falling apart. Regardless of whether they fall apart or...
Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy