Linux: The Ultimate Step by Step Guide to Quickly and Easily Learning Linux
LINUX The Ultimate Step by Step Guide to Quickly and Easily Learning Linux This book is a precise yet comprehensive manual that includes all the tips, secrets and procedures that will help you learn Linux in a fun, fast and easy manner. It is a step-by-step guide that contains an in-depth analysis of contemporary and proven steps that will help... Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition
Now updated—the systematic introductory guide to modern analysis of large data sets
As data sets continue to grow in size and complexity, there has been an inevitable move towards indirect, automatic, and intelligent data analysis in which the analyst works via more complex and sophisticated software tools. This book...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...
Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed
This comprehensive book covers the strategy, tactics, and processes needed for successful project portfolio management. It outlines a road map to unprecedented project management improvement and includes a detailed implementation plan for both strategic planning and a PMO that gives you measurable results in weeks. The author delineates four...
Programming Many-Core Chips
Parallel computing has been confined, for much of its over 40 year history, to highly
specialized, technology-wise advanced domains such as scientific computing or
telecommunications. There were only a few experts who had the background and
experience to write efficient, robust and scalable programs for these parallel machines.
CompTIA Security+ 2008 In Depth
Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...
|Result Page: 51 50 49 48 47 46 45 44 43 42 |