Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Machine Learning in Java: Helpful techniques to design, build, and deploy powerful machine learning applications in Java, 2nd Edition
Machine Learning in Java: Helpful techniques to design, build, and deploy powerful machine learning applications in Java, 2nd Edition

Leverage the power of Java and its associated machine learning libraries to build powerful predictive models

Key Features

  • Solve predictive modeling problems using the most popular machine learning Java libraries
  • Explore data processing, machine learning, and NLP concepts...
Artificial Intelligence: A Systems Approach (w/CDROM)(Computer Science) (Engineering)
Artificial Intelligence: A Systems Approach (w/CDROM)(Computer Science) (Engineering)
The history of AI is interesting all by itself. It’s a modern-day drama, filled with excitement and anticipation, discovery, and disappointment. From over-promises of early (and later) AI research, to fears of the unknown from the general public, AI’s history is worthy of study by itself. In this chapter, we’ll explore AI’s...
Introductory Statistics, Third Edition
Introductory Statistics, Third Edition

In this 3rd edition revised text, master expositor Sheldon Ross has produced a unique work in introductory statistics. The text's main merits are the clarity of presentation, contemporary examples and applications from diverse areas, and an explanation of intuition and ideas behind the statistical methods. Concepts are motivated,...

Predictive Analytics For Dummies
Predictive Analytics For Dummies

Combine business sense, statistics, and computers in a new and intuitive way, thanks to Big Data Predictive analytics is a branch of data mining that helps predict probabilities and trends. Predictive Analytics For Dummies explores the power of predictive analytics and how you can use it to make valuable predictions for your business, or in...

New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
This book provides a platform for discussing the challenges that organizations face in order to implement sustainability, ethics, and effective corporate governance, all of which are important elements of “standing out” from other companies. Examining the background of the New European Consensus on development with the new...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

R Deep Learning Projects: Master the techniques to design and develop neural network models in R
R Deep Learning Projects: Master the techniques to design and develop neural network models in R

5 real-world projects to help you master deep learning concepts

Key Features

  • Master the different deep learning paradigms and build real-world projects related to text generation, sentiment analysis, fraud detection, and more
  • Get to grips with R's impressive range of...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
Whether you’re shopping for clothes from your computer or mobile phone, or selling artworks around the globe, you face a dizzying array of choices and decisions. How do I pay? How do I get paid? What if something goes wrong?

The answer? PayPal.

We are—and will continue to be—the
...
Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy