Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Higher Engineering Mathematics, Fifth Edition
Higher Engineering Mathematics, Fifth Edition
Includes: * 1,000 Worked Examples * 1,750 Further Problems * 19 Assignments

John Bird's approach, based on numerous worked examples and interactive problems, is ideal for students from a wide range of academic backgrounds, and can be worked through at the student's own pace. Basic mathematical theories are explained in the simplest of
...
Raspberry Pi For Dummies
Raspberry Pi For Dummies

Embrace the exciting new technology of Raspberry Pi!

With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Java Methods for Financial Engineering: Applications in Finance and Investment
Java Methods for Financial Engineering: Applications in Finance and Investment
In order to build a successful, Java-based application it is important to have a clear understanding of the principles underlying the various financial models. Those models guide the application designer in choosing the most appropriate Java data structures and implementation strategy. This book describes the principles of model building in...
Oracle GoldenGate 12c Implementer's Guide
Oracle GoldenGate 12c Implementer's Guide

Leverage the power of real-time data access for designing, building, and tuning your GoldenGate Enterprise

About This Book

  • Orchestrate the rich features of GoldenGate 12c and exploit the performance-enhancing features and manageability in your Enterprise environment
  • Master data...
Ultra-Low Energy Domain-Specific Instruction-Set Processors (Embedded Systems)
Ultra-Low Energy Domain-Specific Instruction-Set Processors (Embedded Systems)

Modern consumers carry many electronic devices, like a mobile phone, digital camera, GPS, PDA and an MP3 player. The functionality of each of these devices has gone through an important evolution over recent years, with a steep increase in both the number of features as in the quality of the services that they provide. However, providing the...

Safety Design for Space Systems
Safety Design for Space Systems
Progress in space safety lies in the acceptance of safety design and engineering as an integral part of the design and implementation process for new space systems. Safety must be seen as the principle design driver of utmost importance from the outset of the design process, which is only achieved through a culture change that moves all...
Spatial Analysis, GIS and Remote Sensing: Applications in the Health Sciences
Spatial Analysis, GIS and Remote Sensing: Applications in the Health Sciences
This new book explores the rapidly expanding applications of spatial analysis, GIS and remote sensing in the health sciences, and medical geography. For the practitioner or researcher this book is full of useful techniques if your work applies to environmental and public health, biostatistics, epidemiology, health services, medical geography,...
Cambridge Academic English C1 Advanced Student's Book: An Integrated Skills Course for EAP
Cambridge Academic English C1 Advanced Student's Book: An Integrated Skills Course for EAP

A three-level (B1+ to C1) integrated skills course for higher education students at university or on foundation courses. The C1 Advanced Student's Book consolidates academic study skills. Students' analytical skills are challenged with an increased range of authentic written and spoken academic texts. From essay organisation, taking...

Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Mobile robots are widely applied in a range of applications from transportation, surveillance through to health care. In all these applications it is clearly important to be able to analyse and control the performance of the mobile robot and it is therefore surprising that formalised methods to achieve this are not readily available. This book...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy