 |
|
|
|
|
 Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical... |  |  Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding... |  |  RapidMiner: Data Mining Use Cases and Business Analytics Applications
Powerful, Flexible Tools for a Data-Driven World
As the data deluge continues in today’s world, the need to master data mining, predictive analytics, and business analytics has never been greater. These techniques and tools provide unprecedented insights into data, enabling better decision making and forecasting, and... |
|
|
 Microservices: Flexible Software Architecture
The Most Complete, Practical, and Actionable Guide to Microservices
Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates... |  |  GPRS in Practice : A Companion to the SpecificationsGPRS is now an established technology allowing packet-data access to the internet and intranets and it is expected that consumer demand for the service will continue to increase, especially when the higher data rates are made available.
The GPRS technology is also carried forward to the 3G systems and it is vital that engineers working in... |  |  |
|
|
Result Page: 66 65 64 63 62 61 60 59 58 57 |