Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Machine Learning for Finance: Principles and practice for financial insiders
Machine Learning for Finance: Principles and practice for financial insiders

A guide to advances in machine learning for financial professionals, with working Python code

Key Features

  • Explore advances in machine learning and how to put them to work in financial industries
  • Clear explanation and expert discussion of how machine learning works, with...
Ethereum for Architects and Developers
Ethereum for Architects and Developers
Explore the Ethereum ecosystem step by step with extensive theory, labs, and live use cases. This book takes you through BlockChain concepts; decentralized applications; Ethereum’s architecture; Solidity smart contract programming with examples; and testing, debugging, and deploying smart contracts on...
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
Use this practical, step-by-step guide on lean agile strategy to harness technological disruption at your large business to successfully advance your business rather than suffer a loss of business. The lean agile enterprise concept is demystified and translated into action as the author shares his experience with both success and major...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Anonymizing Health Data: Case Studies and Methods to Get You Started
Anonymizing Health Data: Case Studies and Methods to Get You Started

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Economics / Investments & Securities

Praise for Reverse Engineering Deals on Wall Street with Microsoft Excel

"Allman has written an excellent sequel to his first book Modeling Structured Finance Cash Flows with Microsoft Excel, providing a simple guide on how to deconstruct cash flows through modeling and understanding...

Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Testing and Tuning Market Trading Systems: Algorithms in C++
Testing and Tuning Market Trading Systems: Algorithms in C++

Build, test, and tune financial, insurance or other market trading systems using C++ algorithms and statistics. You’ve had an idea and have done some preliminary experiments, and it looks promising. Where do you go from here?  Well, this book discusses and dissects this case study approach.  

...

Design and Control of Workflow Processes: Business Process Management for the Service Industry (Lecture Notes in Computer Science)
Design and Control of Workflow Processes: Business Process Management for the Service Industry (Lecture Notes in Computer Science)

The motivation behind the conception of this monograph was to advance scientific knowledge about the design and control of workflow processes. A workflow pr- ess (or workflow for short) is a specific type of business process, a way of or- nizing work and resources. Workflows are commonly found within large admin- trative organizations such as...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy