Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Fundamentals of Data Visualization: A Primer on Making Informative and Compelling Figures
Fundamentals of Data Visualization: A Primer on Making Informative and Compelling Figures

Effective visualization is the best way to communicate information from the increasingly large and complex datasets in the natural and social sciences. But with the increasing power of visualization software today, scientists, engineers, and business analysts often have to navigate a bewildering array of visualization...

Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning
Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning

Agriculture 5.0: Artificial Intelligence, IoT & Machine Learning provides an interdisciplinary, integrative overview of latest development in the domain of smart farming. It shows how the traditional farming practices are being enhanced and modified by automation and introduction of modern scalable technological...

Understanding the Role of Business Analytics
Understanding the Role of Business Analytics

This book encompasses empirical evidences to understand the application of data analytical techniques in emerging contexts. Varied studies relating to manufacturing and services sectors including healthcare, banking, information technology, power, education sector etc. stresses upon the systematic approach followed in...

RESTful Web API Design with Node.JS - Second Edition
RESTful Web API Design with Node.JS - Second Edition

Key Features

  • Create a fully featured RESTful API solution from scratch.
  • Learn how to leverage Node.JS, Express, MongoDB and NoSQL datastores to give an extra edge to your REST API design.
  • Use this practical guide to integrate MongoDB in your Node.js application.

Book...

Computational Methods for Deep Learning: Theoretic, Practice and Applications (Texts in Computer Science)
Computational Methods for Deep Learning: Theoretic, Practice and Applications (Texts in Computer Science)

Integrating concepts from deep learning, machine learning, and artificial neural networks, this highly unique textbook presents content progressively from easy to more complex, orienting its content about knowledge transfer from the viewpoint of machine intelligence. It adopts the methodology from graphical theory, mathematical...

Microsoft Powerpoint 2016: The Complete Guide
Microsoft Powerpoint 2016: The Complete Guide

PowerPoint 2016 is a presentation program that presents information in the form of slides. This program is developed by Microsoft and was originally called “Presenter” released by another company Forethought Inc. It was originally launched in May 1990 and was and always been a part of the Microsoft Suite. It is popularly known as...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

The C++ Programming Language (3rd Edition)
The C++ Programming Language (3rd Edition)

This book presents every major C++ language feature and the standard library. It is organized around language and library facilities. However, features are presented in the context of their use. That is, the focus is on the language as the tool for design and programming rather than on the language in itself. This book demonstrates key...

Creating a Presentation in PowerPoint: Visual QuickProject Guide
Creating a Presentation in PowerPoint: Visual QuickProject Guide
PowerPoint is nearly ubiquitous in today's world--in business settings, of course, but in schools and universities, clubs and organizations--almost everywhere you turn. It's not a difficult tool to use, but the presentations people create in PowerPoint range widely in quality--dazzling or dull, enlivening or enervating. Now, to help users deliver...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
unlimited object storage image
Result Page: 958 957 956 955 954 953 952 951 950 949 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy