Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III

The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereed proceedings of the 6th International Symposium on Visual Computing, ISVC 2010, held in Las Vegas, NV, USA, in November/December 2010. The 93 revised full papers and 73 poster papers presented together with 44 full and 6 poster papers of 7 special tracks were...

Personal Firewalls for Administrators and Remote Users
Personal Firewalls for Administrators and Remote Users

Personal firewalls explained—for remote corporate and home users.

In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these...

Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Streamline data analysis with an intuitive, visual Six Sigma strategy

Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...

Pig Design Patterns
Pig Design Patterns

Simplify Hadoop programming to create complex end-to-end Enterprise Big Data solutions with Pig

Overview

  • Quickly understand how to use Pig to design end-to-end Big Data systems
  • Implement a hands-on programming approach using design patterns to solve commonly occurring enterprise Big Data...
Face Processing: Advanced Modeling and Methods
Face Processing: Advanced Modeling and Methods
As one of the most important applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past 10 years. There are at least two reasons for this trend: the first is the wide range of commercial and law-enforcement applications, and the second is the availability of feasible...
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)

Because of its unique visual emphasis, Visual Six Sigma opens the doors for you to take an active role in data-driven decision making, empowering you to leverage your contextual knowledge to pose relevant questions and make sound decisions.

This book shows you how to leverage dynamic visualization and exploratory data analysis...

Making Things See: 3D vision with Kinect, Processing, Arduino, and MakerBot (Make: Books)
Making Things See: 3D vision with Kinect, Processing, Arduino, and MakerBot (Make: Books)

This detailed, hands-on guide provides the technical and conceptual information you need to build cool applications with Microsoft’s Kinect, the amazing motion-sensing device that enables computers to see. Through half a dozen meaty projects, you’ll learn how to create gestural interfaces for software, use motion capture...

Nuclear Medicine in Infectious Diseases
Nuclear Medicine in Infectious Diseases

This book is designed as a reference manual that is exceptional in systematically discussing every aspect of nuclear medicine imaging of infections, with careful explanation of the most up-to-date concepts and recent guidelines on diagnostic flowcharts as shared between the EANM, ESR, ESNR, ESCMID, ESC, EACVI, ECCO, ESGAR and EBJIS....

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

ERP and Data Warehousing in Organizations: Issues and Challenges
ERP and Data Warehousing in Organizations: Issues and Challenges
Offering ERP deployment strategies for information as diverse as patient records, police and community relations, and geospatial services, this text addresses the complex issues that IT and communication technologies pose for organizations of all sizes.

The successful implementation and deployment of enterprise resource planning depends...

Keeping Better Company: Corporate Governance Ten Years On
Keeping Better Company: Corporate Governance Ten Years On
This book is about the way companies are directed and controlled, and relate to their sources of finance—what has come to be called corporate governance. The term‘company’ is better than ‘corporation’ as it reflects the human dimension; companies are collections of people, not just inanimate structures.
...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy