Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
XML in a Nutshell, 2nd Edition
XML in a Nutshell, 2nd Edition
This powerful new edition provides developers with a comprehensive guide to the rapidly evolving XML space. Serious users of XML will find topics on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. Simply put, this is...
WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

The 60-Second Commute: A Guide to Your 24/7 Home Office Life
The 60-Second Commute: A Guide to Your 24/7 Home Office Life
The 60-Second Commute is the start-to-finish sourcebook for everyone with a home office-or a dream. It brings together practical solutions for childcare, balancing work and family, health insurance, managing your time, organizing your office, marketing, technology, budgeting, vacations, taxes, incorporation, and...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

The Internet connects millions of people around the world and allows for immediate communication and access to a seemingly limitless amount of information. Data, video, and voice, almost every single type of communication, travels across the Internet. Some of this communication is private.

The language...

Economic Development and Financial Markets: Latest Research and Policy Insights from Central and Southeastern Europe (Contributions to Economics)
Economic Development and Financial Markets: Latest Research and Policy Insights from Central and Southeastern Europe (Contributions to Economics)
This book offers fresh insights into the economic development and financial markets of Southeastern and Central European countries. The first part analyses macroeconomic trends and monetary policy issues, while the second part explores the development of financial and insurance markets. With contributions covering topics such as regional and...
Design and Control of Workflow Processes: Business Process Management for the Service Industry (Lecture Notes in Computer Science)
Design and Control of Workflow Processes: Business Process Management for the Service Industry (Lecture Notes in Computer Science)

The motivation behind the conception of this monograph was to advance scientific knowledge about the design and control of workflow processes. A workflow pr- ess (or workflow for short) is a specific type of business process, a way of or- nizing work and resources. Workflows are commonly found within large admin- trative organizations such as...

Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)
Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)

Investment and risk management problems are fundamental problems for  financial institutions and involve both speculative and hedging decisions. A structured approach to these problems naturally leads one to the field of applied mathematics in order to translate subjective probability beliefs and attitudes towards risk and reward into...

Effective Statistical Learning Methods for Actuaries II: Tree-Based Methods and Extensions (Springer Actuarial)
Effective Statistical Learning Methods for Actuaries II: Tree-Based Methods and Extensions (Springer Actuarial)

This book summarizes the state of the art in tree-based methods for insurance: regression trees, random forests and boosting methods. It also exhibits the tools which make it possible to assess the predictive performance of tree-based models. Actuaries need these advanced analytical tools to turn the massive data sets now at their...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy