Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all factors that affect a business, such as customers, competitors, business partners,...

Society and Health: Sociology for Health Professionals
Society and Health: Sociology for Health Professionals

The publication of Society and Health: Sociology for Health Professionals represents the results of an information-gathering process that has extended over a 30-year career as a health professional. It reflects a determination to frame medical sociology as a multidisciplinary endeavor that must, of necessity, draw information from a wide...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Applying Design for Six Sigma to Software and Hardware Systems
Applying Design for Six Sigma to Software and Hardware Systems

The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS

Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two
...

Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)
Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)

This book presents a remarkable collection of chapters that cover a wide range of topics in the areas of information and communication technologies and their real-world applications. It gathers the Proceedings of the Future of Information and Communication Conference 2019 (FICC 2019), held in San Francisco, USA from March 14 to 15,...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
No two data quality projects are the same. Some are large efforts focused entirely on improving some quality aspect of information. Others are subprojects within other efforts, such as a data migration. Still others are led by a few individuals trying to make a difference as they perform their everyday activities. What I like about McGilvray's Ten...
Modern Business Process Automation: YAWL and its Support Environment
Modern Business Process Automation: YAWL and its Support Environment
The held of Business Process Management (BPM) is marred by a seemingly end- less sequence of (proposed) industry standards. Contrary to other fields (e.g.. civil or electronic engineering), these standards are not the result of a v\ idelj supported consolidation of well-understood and well-established concepts and practices. In the...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Advanced Software Engineering: Expanding the Frontiers of Software Technology
Advanced Software Engineering: Expanding the Frontiers of Software Technology
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
Animation Writing and Development, : From Script Development to Pitch (Focal Press Visual Effects and Animation)
Animation Writing and Development, : From Script Development to Pitch (Focal Press Visual Effects and Animation)
"The real value of this tome lies in its concise technical approach, offering newcomers various route-maps through the storytelling maze." - Imagine magazine

Become a successful Animation Writer!

The art. The craft. The business. Animation Writing and Development takes students and
...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy