Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a...
Scala Machine Learning Projects: Build real-world machine learning and deep learning projects with Scala
Scala Machine Learning Projects: Build real-world machine learning and deep learning projects with Scala

Powerful smart applications using deep learning algorithms to dominate numerical computing, deep learning, and functional programming.

Key Features

  • Explore machine learning techniques with prominent open source Scala libraries such as Spark ML, H2O, MXNet, Zeppelin, and DeepLearning4j
  • ...
How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
Decision Management Systems: A Practical Guide to Using Business Rules and Predictive Analytics (IBM Press)
Decision Management Systems: A Practical Guide to Using Business Rules and Predictive Analytics (IBM Press)

"A very rich book sprinkled with real-life examples as well as battle-tested advice.”
—Pierre Haren, VP ILOG, IBM

"James does a thorough job of explaining Decision Management Systems as enablers
of a formidable business transformation.”
—Deepak Advani, Vice President,
...

SAP GRC For Dummies (Computer/Tech)
SAP GRC For Dummies (Computer/Tech)
Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole...
Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Visual Data Mining: Techniques and Tools for Data Visualization and Mining

Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Plan and launch your PPC campaign and keep track of its progress

If you want potential customers to form a traffic jam at your Web site, Pay Per Click just might do the trick. This book will help you decide! It tells you all about Google AdWords and Yahoo! Sponsored Search, targeting your customers, watching out for fraud, assessing the pros...

Social Engineering: The Art of Human Hacking
Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy