Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Marketing Metrics: The Definitive Guide to Measuring Marketing Performance (2nd Edition)
Marketing Metrics: The Definitive Guide to Measuring Marketing Performance (2nd Edition)

The Definitive Guide to the New State-of-the-Art in Marketing Metrics

 

Marketing Metrics, Second Edition, is the definitive guide to today’s most valuable marketing metrics. In this thoroughly updated and significantly...

Computer Vision and Applications: A Guide for Students and Practitioners (With CD-ROM)
Computer Vision and Applications: A Guide for Students and Practitioners (With CD-ROM)
Computer Vision and Applications, Concise Edition, offers a fresh approach to computer vision by regarding the whole process from image formation to measuring, recognition, or reacting as an integral process. Computer vision is understood as the host of techniques used to acquire, process, analyze, and understand complex,...
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

Python Geospatial Analysis Cookbook
Python Geospatial Analysis Cookbook

Over 60 recipes to work with topology, overlays, indoor routing, and web application analysis with Python

About This Book

  • Explore the practical process of using geospatial analysis to solve simple to complex problems with reusable recipes
  • Concise step-by-step instructions to teach you...
Clojure High Performance Programming - Second Edition
Clojure High Performance Programming - Second Edition

Become an expert at writing fast and high performant code in Clojure 1.7.0

About This Book

  • Enhance code performance by using appropriate Clojure features
  • Improve the efficiency of applications and plan their deployment
  • A hands-on guide to designing Clojure programs to get...
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Environmental Instrumentation and Analysis Handbook
Environmental Instrumentation and Analysis Handbook
It has been two decades since environmental science, environmental engineering, and environmental consulting took root as major disciplines and professions throughout the developed world. The learning curve has been steep as it relates to the previously unrecognized physics of contaminant transport. Today those principles are...
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
Electrical and Electronic Principles and Technology, Third Edition
Electrical and Electronic Principles and Technology, Third Edition
An introductory textbook for students of electronics and electrical engineering

* New colour layout helps navigation and highlights key learning points, formulae and exercises
* 400 worked problems and over 1,300 questions, all with answers
* Fully up to date with the
...
Quantum Causality: Conceptual Issues in the Causal Theory of Quantum Mechanics
Quantum Causality: Conceptual Issues in the Causal Theory of Quantum Mechanics

This is a treatise devoted to the foundations of quantum physics and the role that causality plays in the microscopic world governed by the laws of quantum mechanics. There is no sharp dividing line between physics and philosophy of physics. This is especially true for quantum physics where debate on its interpretation and the status of the...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy