 |
|
 Business Intelligence with MicroStrategy Cookbook
Over 90 practical, hands-on recipes to help you build your MicroStrategy business intelligence project, including more than a 100 screencasts
Overview
-
Learn about every step of the BI project, starting from the installation of a sample database
-
Design web reports and documents
- ...
|  |  Security+ Guide to Network Security Fundamentals
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer... |  |  Transition to Renewable Energy Systems
In the wake of global climate change and increasing geopolitical instability of oil supply an accelerated transition to renewable energy system gets increasingly important, if not unavoidable.
This book encompasses reports of select energy strategies as well as in-depth technical information of the already or potentially involved... |
|
 Urban Aerodynamics: Wind Engineering for Urban Planners and Designers
Prepared by the Task Committee on Urban Aerodynamics of the Environmental Wind Engineering Committee of the Technical Council on Wind Engineering of ASCE. Urban Aerodynamics: Wind Engineering for Urban Planners and Designers introduces the basic tools and technology used by engineers to determine the effects of wind on city streets and... |  |  Biophotonics: Optical Science and Engineering for the 21st Century
It is now well established that all living systems emit a weak but permanent photon flux in the visible and ultraviolet range. This biophoton emission is correlated with many, if not all, biological and physiological functions. There are indications of a hitherto-overlooked information channel within the living system. Biophotons may trigger... |  |  SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog
SQL injection represents... |
|
|
 Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... |  |  Android Security Cookbook
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Overview
-
Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
... |  |  Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,... |
|
| Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |