Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Magic For Dummies
Magic For Dummies

You don’t need a white tiger, expensive props, or hours of preparation to do magic. With a little practice, some clever misdirection (which lays at the heart of all magic tricks), and showmanship, you can surprise family, friends, and coworkers using a few everyday items!

If you’re looking to saw a beautiful women in...

Intro to Java Programming, Comprehensive Version (10th Edition)
Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Gain a deeper understanding of how Raspberry Pi works to get the results you want right in the palm of your hand. This book helps you understand the right connections and software to drive your Raspberry Pi into opening the worlds of programming, electronic experiments, system control, digital imaging, and the Internet of Things to you. ...
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)

Big Data Application Architecture Pattern Recipes provides an insight into heterogeneous infrastructures, databases, and visualization and analytics tools used for realizing the architectures of big data solutions. Its problem-solution approach helps in selecting the right architecture to solve the problem at hand. In the process of...

Quantum Computing Explained
Quantum Computing Explained
“In the twenty-first” century it is reasonable to expect that some of the most important developments in science and engineering will come about through interdisciplinary research. Already in the making is surely one of the most interesting and exciting development we are sure to see for a long time, quantum computation.

A
...
Curves and Surfaces for Computer Graphics
Curves and Surfaces for Computer Graphics

Images are all around us. We see them in color and in high resolution. In fact, the natural images we see with our eyes seem perfectly smooth, with no jagged edges and no graininess. Computer graphics, on the other hand, deals with images that consist of small dots, pixels. When we first hear of this feature of computer graphics, we...

Domain-Driven Design: Tackling Complexity in the Heart of Software
Domain-Driven Design: Tackling Complexity in the Heart of Software

The software development community widely acknowledges that domain modeling is central to software design. Through domain modeling, software developers are able to express rich functionality and translate that functionality into software implementation that truly serves the needs of its users. Despite its obvious importance,...

pfSense 2 Cookbook
pfSense 2 Cookbook

pfSense is an open source distribution of FreeBSD-based firewall which provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options which, compared to other offerings, makes determining requirements a little more difficult and a lot more important....

Troubleshooting PostgreSQL
Troubleshooting PostgreSQL

Intercept problems and challenges typically faced by PostgreSQL database administrators with the best troubleshooting techniques

About This Book

  • Detect and solve performance, indexing, and fuzzy matches problems and more in an effective way
  • Tune PostgreSQL databases and remove bottlenecks...
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server is becoming a more mature, more feature-rich, and more secure database management system with each new version. SQL Server 2012 is an enterprise-class relational database server. Sometimes, it might not look like it to the staff whose responsibilities are to deploy it, to create databases and write T-SQL code, and to...
Quick Clojure: Effective Functional Programming
Quick Clojure: Effective Functional Programming
Get up to speed with Clojure in this quick and practical primer. You'll learn the nuts and bolts of functional programming, data structures, sequences, destructuring, pattern matching, polymorphism, concurrency, conventions, and more. Author Mark McDonnell talks about organization with namespaces; how to change the language via macros;...
Result Page: 105 104 103 102 101 100 99 98 97 96 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy