Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Authoritarianism and How to Counter It
Authoritarianism and How to Counter It

After the collapse of the Soviet Union, it was assumed that liberal democracies would flourish worldwide. Instead, today authoritarian leaders are gaining power – from Trump’s US and Bolsonaro's Brazil to Orban's Hungary – while Russia and China have turned back towards their old, autocratic traditions. This...

An Executive’s Guide to Software Quality in an Agile Organization: A Continuous Improvement Journey
An Executive’s Guide to Software Quality in an Agile Organization: A Continuous Improvement Journey
Imagine a world where product quality is integrated into every function in your organization. Developers, quality engineers, product managers, leaders at all levels, sales, services, and support work together and focus on a shared vision. That vision consists of delivering quality value to customers...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
Mastering Turbulence: The Essential Capabilities of Agile and Resilient Individuals, Teams and Organizations
Mastering Turbulence: The Essential Capabilities of Agile and Resilient Individuals, Teams and Organizations
The essential capabilities organizations need to master turbulent change

Rapid and disruptive change threatens the adaptive capacity of organizations, along with the individuals and teams leading them. Based upon over a decade of global research and consulting, Joseph E. McCann and John W. Selsky outline five capabilities...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Expert Twisted: Event-Driven and Asynchronous Programming with Python
Expert Twisted: Event-Driven and Asynchronous Programming with Python
Explore Twisted, the Python-based event-driven networking engine, and review several of its most popular application projects. It is written by community leaders who have contributed to many of the projects covered, and share their hard-won insights and experience.

Expert Twisted starts with an introduction...
Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Get ready to be an effective digital leader, influencer, disruptor, and catalyst for change in the digital world!

As a leader you need to constantly evolve to achieve sustained success. The world is being transformed by Digital. The pace of change is constantly accelerating and volatility and complexity are the
...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Result Page: 67 66 65 64 63 62 61 60 59 58 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy