 |
|
 Analytics: The Agile Way (Wiley and SAS Business Series)
For decades now, companies big and small have embraced Agile software development methods. The rationale here is straightforward:
-
Why take one or two years to fully deploy a system, app, or website when so many things can and do go wrong?
-
Why try to cook one big batch and boil the ocean?
- ...
|  |  Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s... |  |  Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first... |
|
 C# 7.0 All-in-One For Dummies
Sharpen your knowledge of C#
C# know-how is a must if you want to be a professional Microsoft developer. It's also good to know a little C# if you're building tools for the web, mobile apps, or other development tasks. C# 7.0 All-in-One For Dummies offers a deep dive into C# for coders still learning the... |  |  Learning Docker - Second Edition: Build, ship, and scale faster
Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture
About This Book
-
This up-to-date edition...
|  |  The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that... |
|
 |  |  Get the Girls Out
I was going to write a business book – a career journal filled
with clever learnings, sage advice and world-changing missions
– but I was struggling, big time. By struggling, I mean I hated
every word. I spent more than two years producing bursts of
word count, then rereading and deleting them.
Then... |  |  |
|
|
| Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |