Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

SQL Server 2017 Integration Services Cookbook: Powerful ETL techniques to load and transform data from almost any source
SQL Server 2017 Integration Services Cookbook: Powerful ETL techniques to load and transform data from almost any source

Harness the power of SQL Server 2017 Integration Services to build your data integration solutions with ease

About This Book

  • Acquaint yourself with all the newly introduced features in SQL Server 2017 Integration Services
  • Program and extend your packages to enhance their...
Sampling Algorithms (Springer Series in Statistics)
Sampling Algorithms (Springer Series in Statistics)
This book is based upon courses on sampling algorithms. After having used scattered notes for several years, I have decided to completely rewrite the material in a consistent way. The books of Brewer and Hanif (1983) and H´ajek (1981) have been my works of reference. Brewer and Hanif (1983) have drawn up an...
The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems
The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems

A radical shift in perspective to transform your organization to become more innovative

The Design Thinking Playbook is an actionable guide to the future of business. By stepping back and questioning the current mindset, the faults of the status quo stand out in stark relief—and this guide gives you the tools...

Mastering .NET Machine Learning
Mastering .NET Machine Learning

About This Book

  • Based on .NET framework 4.6.1, includes examples on ASP.NET Core 1.0
  • Set up your business application to start using machine learning techniques
  • Familiarize the user with some of the more common .NET libraries for machine learning
  • Implement...
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

Flask Web Development: Developing Web Applications with Python
Flask Web Development: Developing Web Applications with Python

Take full creative control of your web applications with Flask, the Python-based microframework. With the second edition of this hands-on book, you’ll learn Flask from the ground up by developing a complete, real-world application created by author Miguel Grinberg. This refreshed edition accounts for important technology...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Angular: Up and Running: Learning Angular, Step by Step
Angular: Up and Running: Learning Angular, Step by Step

If you’re familiar with JavaScript, this hands-on guide will quickly get you up to speed on the Angular framework for building high-performance web-based desktop, mobile, and single-page applications. Initially dubbed Angular 2, this version is a complete rewrite from the same team that built the initial version of AngularJS....

Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts

Transform yourself into a specialist in DevOps adoption for Big Data on cloud

Key Features

  • Learn the concepts of Bigdata and Devops and Implement them
  • Get Acquainted with DevOps Frameworks Methodologies and Tools
  • A practical approach to build and work efficiently with your...
Web Developer's Reference Guide
Web Developer's Reference Guide

A one-stop guide to the essentials of web development including popular frameworks such as jQuery, Bootstrap, AngularJS, and Node.js

About This Book

  • Understand the essential elements of HTML, CSS, and JavaScript, including how and when to use them
  • Walk through three of the...
Result Page: 263 262 261 260 259 258 257 256 255 254 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy