Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Simulation-Based Algorithms for Markov Decision Processes (Communications and Control Engineering)
Simulation-Based Algorithms for Markov Decision Processes (Communications and Control Engineering)
Markov decision process (MDP) models are widely used for modeling sequential decision-making problems that arise in engineering, economics, computer science, and the social sciences.  Many real-world problems modeled by MDPs have huge state and/or action spaces, giving an opening to the curse of dimensionality and so making practical...
Arguing with Zombies: Economics, Politics, and the Fight for a Better Future
Arguing with Zombies: Economics, Politics, and the Fight for a Better Future

An accessible, compelling introduction to today’s major policy issues from the New York Times columnist, best-selling author, and Nobel prize–winning economist Paul Krugman.

There is no better guide than Paul Krugman to basic economics, the ideas that animate much of our public...

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Communication, Interpreting and Language in Wartime: Historical and Contemporary Perspectives (Palgrave Studies in Languages at War)
Communication, Interpreting and Language in Wartime: Historical and Contemporary Perspectives (Palgrave Studies in Languages at War)

This edited book provides a multi-disciplinary approach to the topics of translation and cross-cultural communication in times of war and conflict. It examines the historical and contemporary experiences of interpreters in war and in war crimes trials, as well as considering policy issues in communication difficulties in war-related...

Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
Himalaya on the Threshold of Change (Advances in Global Change Research)
Himalaya on the Threshold of Change (Advances in Global Change Research)

This book provides a unique and comprehensive assessment of the changes that have been taking place in the Himalayas. It describes in detail all the aspects of change, both natural and cultural, along with their implications, and suggests policy measures to help mitigate them. The book is divided into two major sections – on...

Orchestrating Local Climate Policy in the European Union: Inter?Municipal Coordination and the Covenant of Mayors in Germany and France ... Energy Policy and Climate Protection)
Orchestrating Local Climate Policy in the European Union: Inter?Municipal Coordination and the Covenant of Mayors in Germany and France ... Energy Policy and Climate Protection)
Can we sidestep tedious climate policy negotiations and forge a coalition of the willing instead? Many international organizations and scholars hope to spur local climate action by orchestration, indirect and voluntary governance arrangements. Lena Bendlin looks beyond the apparent success of voluntary initiatives using the example of the...
Wellbeing, Resilience and Sustainability: The New Trinity of Governance (Building a Sustainable Political Economy: SPERI Research & Policy)
Wellbeing, Resilience and Sustainability: The New Trinity of Governance (Building a Sustainable Political Economy: SPERI Research & Policy)

Wellbeing, resilience and sustainability are three of the most popular ideas in current usage and are said to represent a much-needed paradigm shift in political and policy thinking. This book is unique in bringing the three concepts together as representing a new trinity of governance. Here we introduce some of the commonalities...

Result Page: 70 69 68 67 66 65 64 63 62 61 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy