Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi
Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi

If you’re among the many hobbyists and designers who came to electronics through Arduino and Raspberry Pi, this cookbook will help you learn and apply the basics of electrical engineering without the need for an EE degree. Through a series of practical recipes, you’ll learn how to solve specific problems while diving into...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Control Theory for Engineers: A Primer (Environmental Science and Engineering / Environmental Engine)
Control Theory for Engineers: A Primer (Environmental Science and Engineering / Environmental Engine)

Control Theory is at the heart of information and communication technologies of complex systems. It can contribute to meeting the energy and environmental challenges we are facing.

The textbook is organized in the way an engineer classically proceeds to solve a control problem, that is, elaboration of a mathematical model capturing...

The Success of Open Source
The Success of Open Source

Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...

Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Discover how to detect fraud, biases, or errors in your data using Access or Excel

With over 300 images, Forensic Analytics reviews and shows how twenty substantive and rigorous tests can be used to detect fraud, errors, estimates, or biases in your data. For each test, the original data is shown with the steps needed to get to the...

Result Page: 56 55 54 53 52 51 50 49 48 47 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy