Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Statistical and Machine Learning Approaches for Network Analysis (Wiley Series in Computational Statistics)
Statistical and Machine Learning Approaches for Network Analysis (Wiley Series in Computational Statistics)

Explore the multidisciplinary nature of complex networks through machine learning techniques

Statistical and Machine Learning Approaches for Network Analysis provides an accessible framework for structurally analyzing graphs by bringing together known and novel approaches on graph classes and graph measures for...

Recent Developments in the Ordered Weighted Averaging Operators: Theory and Practice
Recent Developments in the Ordered Weighted Averaging Operators: Theory and Practice

The area of aggregation operations is one of the most promising off-springs of fuzzy sets theory. Before Zadeh introduced fuzzy set connectives in 1965, there was a wide gap between logic and decision sciences. On the one hand, multiplevalued logics proposed many-valued extensions of the conjunctions and disjunctions for which the...

Statistical Analysis of Financial Data in R (Springer Texts in Statistics)
Statistical Analysis of Financial Data in R (Springer Texts in Statistics)

Although there are many books on mathematical finance, few deal with the statistical aspects of modern data analysis as applied to financial problems. This textbook fills this gap by addressing some of the most challenging issues facing financial engineers. It shows how sophisticated mathematics and modern statistical techniques can...

Analyzing Baseball Data with R (Chapman & Hall/CRC The R Series)
Analyzing Baseball Data with R (Chapman & Hall/CRC The R Series)

With its flexible capabilities and open-source platform, R has become a major tool for analyzing detailed, high-quality baseball data. Analyzing Baseball Data with R provides an introduction to R for sabermetricians, baseball enthusiasts, and students interested in exploring the rich sources of baseball data. It...

Advanced Web Metrics with Google Analytics, 2nd Edition
Advanced Web Metrics with Google Analytics, 2nd Edition

Packed with insider tips and tricks, this how-to guide is fully revised to cover the latest version of Google Analytics and shows you how to implement proven Web analytics methods and concepts.

This second edition of the bestselling Advanced Web Metrics with Google Analytics is the perfect book for marketers, vendors,...

Construction Quality and the Economy: A Study at the Firm Level (Management in the Built Environment)
Construction Quality and the Economy: A Study at the Firm Level (Management in the Built Environment)
This book discusses the relationship between construction quality and the state of the Singapore national economy, and describes how construction quality is affected as contracting firms strategically manage issues relating to profitability and survivability during economic boom and bust cycles. 

Adopting a
...
Quantitative Approaches in Object-oriented Software Engineering
Quantitative Approaches in Object-oriented Software Engineering

Measures of software internal attributes have been extensively used to help software managers, customers and users to characterize, assess and improve the quality of software products. The introduction of object-oriented (OO) software provides powerful design mechanisms with which to do this, and new technologies—e.g., OO frameworks, OO...

How to Cheat at Designing Security for a Windows Server 2003 Network
How to Cheat at Designing Security for a Windows Server 2003 Network
When looking at an organization's security needs, you should begin with any existing security policies or procedures that the organization might already have in place. We started this chapter with an in-depth examination of how to analyze a company's business requirements for network and data security. This included looking at these existing...
Sparse Adaptive Filters for Echo Cancellation (Synthesis Lectures on Speech and Audio Processing)
Sparse Adaptive Filters for Echo Cancellation (Synthesis Lectures on Speech and Audio Processing)

Adaptive filters with a large number of coefficients are usually involved in both network and acoustic echo cancellation. Consequently, it is important to improve the convergence rate and tracking of the conventional algorithms used for these applications. This can be achieved by exploiting the sparseness character of the echo paths....

Being Agile: Your Roadmap to Successful Adoption of Agile
Being Agile: Your Roadmap to Successful Adoption of Agile

Being Agile is your roadmap to successfully transforming your organization to an Agile culture. Veteran agile coach Mario Moreira teaches new adopters how to implement a robust Agile framework to derive from it the maximum business benefit in terms of customer value, revenue, and employee engagement. 

...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy