Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Handbook of Banking Technology
The Handbook of Banking Technology
Competitive advantage in banking comes from effective use of technology

The Handbook of Banking Technology provides a blueprint for the future of banking, with deep insight into the technologies at the heart of the industry. The rapid evolution of IT brings continual change and demand for investment — yet...

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Encyclopedia of Big Data Technologies
Encyclopedia of Big Data Technologies

The Encyclopedia of Big Data Technologies provides researchers, educators, students and industry professionals with a comprehensive authority over the most relevant Big Data Technology concepts. With over 300 articles written by worldwide subject matter experts from both industry and academia, the encyclopedia covers topics...

Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Ambient intelligence (AmI) is an element of pervasive computing that brings smartness to living and business environments to make them more sensitive, adaptive, autonomous and personalized to human needs. It refers to intelligent interfaces that recognise human presence and preferences, and adjust smart environments to suit their...
Game Engine Black Book: Doom
Game Engine Black Book: Doom
It was early 1993 and id Software was at the top of the PC gaming industry. Wolfenstein 3D had established the First Person Shooter genre and sales of its sequel Spear of Destiny were skyrocketing. The technology and tools id had taken years to develop were no match for their many competitors.It would have been easy for id to coast on their...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Creating a Presentation in PowerPoint: Visual QuickProject Guide
Creating a Presentation in PowerPoint: Visual QuickProject Guide
PowerPoint is nearly ubiquitous in today's world--in business settings, of course, but in schools and universities, clubs and organizations--almost everywhere you turn. It's not a difficult tool to use, but the presentations people create in PowerPoint range widely in quality--dazzling or dull, enlivening or enervating. Now, to help users deliver...
Aligning Business Strategies and Analytics: Bridging Between Theory and Practice (Advances in Analytics and Data Science, 1)
Aligning Business Strategies and Analytics: Bridging Between Theory and Practice (Advances in Analytics and Data Science, 1)
This book examines issues related to the alignment of business strategies and analytics. Vast amounts of data are being generated, collected, stored, processed, analyzed, distributed and used at an ever-increasing rate by organizations. Simultaneously, managers must rapidly and thoroughly understand the factors driving their business....
LabVIEW for Everyone: Graphical Programming Made Easy and Fun (3rd Edition)
LabVIEW for Everyone: Graphical Programming Made Easy and Fun (3rd Edition)

The #1 Step-by-Step Guide to LabVIEWNow Completely Updated for LabVIEW 8!

Master LabVIEW 8 with the industry's friendliest, most intuitive tutorial: LabVIEW for Everyone, Third Edition. Top LabVIEW...

Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Professional Visual Studio 2017
Professional Visual Studio 2017

Skip the basics and delve right into Visual Studio 2017 advanced features and tools

Professional Visual Studio 2017 is the industry-favorite guide to getting the most out of Microsoft's primary programming technology. From touring the new UI to exploiting advanced functionality, this book is designed to help...

unlimited object storage image
Result Page: 339 338 337 336 335 334 333 332 331 330 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy