Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Structural Geology Algorithms: Vectors and Tensors
Structural Geology Algorithms: Vectors and Tensors

State-of-the-art analysis of geological structures has become increasingly quantitative but traditionally, graphical methods are used in teaching. This innovative lab book provides a unified methodology for problem-solving in structural geology using linear algebra and computation. Assuming only limited mathematical training, the book begins...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4
MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4

Prepare for MCPD Exam 70-519—and help demonstrate your real-world mastery of web application design and development—with this official Microsoft® Exam Ref. Written for experienced, MCTS-certified professionals ready to advance their status—this guide focuses on the critical-thinking and decision-making acumen...

Scrum: Novice to Ninja: Methods for Agile, Powerful Development
Scrum: Novice to Ninja: Methods for Agile, Powerful Development

Why should you use Scrum in your web projects? Simply put, it'll enable your team to get more done in less time.

Scrum is the most popular agile project management methodology used in web projects today. While most Scrum books tend to be lengthy textbooks that cover every detail of Scrum for all types of...

Competing with High Quality Data: Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality
Competing with High Quality Data: Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality

Create a competitive advantage with data quality

Data is rapidly becoming the powerhouse of industry, butlow-quality data can actually put a company at a disadvantage. Tobe used effectively, data must accurately reflect the real-worldscenario it represents, and it must be in a form that is usable andaccessible. Quality data...

Embedded SoPC Design with Nios II Processor and Verilog Examples
Embedded SoPC Design with Nios II Processor and Verilog Examples

Explores the unique hardware programmability of FPGA-basedembedded systems, using a learn-by-doing approach to introduce theconcepts and techniques for embedded SoPC design with Verilog

An SoPC (system on a programmable chip) integrates a processor,memory modules, I/O peripherals, and custom hardware acceleratorsinto a single FPGA...

A Practical Guide to Data Mining for Business and Industry
A Practical Guide to Data Mining for Business and Industry

Data mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create...

Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Instant RSpec Test - Driven Development How-to
Instant RSpec Test - Driven Development How-to

Learn RSpec and redefine your approach towards software development

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Learn how to use RSpec with Rails
  • Easy to read and grok examples
  • Write idiomatic...
Laboratory Hemostasis: A Practical Guide for Pathologists
Laboratory Hemostasis: A Practical Guide for Pathologists

This handbook addresses the need for a straightforward reference for managing a hemostasis laboratory and coordinating testing across multiple locations and technologies. The handbook format allows quick reference to specific topics and is useful for answering specific questions or for Board exam review. The full spectrum of coagulation...

Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy