Turn unstructured data into valuable business insight
Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...
The selling, marketing, and business tips you need to succeed
eBay is the perfect place to learn the ropes of what it's like running an online business. It provides the tools, technology, and platform a would-be entrepreneur needs to launch their first successful small business. It takes some know-how, however, to get...
Most of us struggle with distraction every day: the familiar feeling that our attention is not quite where it should be. We feel it at work and at home and it can be frustrating and uncomfortable. But what is distraction? In his lucid, timely book, Damon Young shows that distraction is more than too many stimuli, or too little attention. It...
Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...
Start a successful online business—and be your own boss!
Being an online entrepreneur means more than just building a website—and this book breaks down everything you need to know to be successful. Inside, you'll get plain-English explanations and easy-to-follow instruction on online business basics, legal...
Developments in the Theory and Practice of Cybercartographyâawarded an Honorable Mention in Earth Science at the Association of American Publishers' 2015 PROSE Awardsâexamines some of the recent developments in the theory and practice of cybercartography and the substantial changes which have taken place since the first...
The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...
Now updated—the systematic introductory guide to modern analysis of large data sets
As data sets continue to grow in size and complexity, there has been an inevitable move towards indirect, automatic, and intelligent data analysis in which the analyst works via more complex and sophisticated software tools. This book...
The only official study guide for the new CCSP exam
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...
Protect Your Organization Against Massive Data Breaches and Their Consequences
Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,...
From her position at Harvard University's Department of Government for over thirty-five years, Judith Shklar (1928-92) taught a long list of prominent political theorists and published prolifically in the domains of modern and American political thought. She was a highly original theorist of liberalism, possessing a broad and...