Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Worst Is Yet to Come: A Post-Capitalist Survival Guide
The Worst Is Yet to Come: A Post-Capitalist Survival Guide
Capitalism is about to commit suicide and is threatening to take us down with it. But will it give way to a grand social utopia or the beginning of a new dark age... albeit WiFi enabled?

The Worst is Yet to Come explores the disturbing possibility that the current crisis of neoliberal capitalism isn’t
...
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

What to Do When Things Go Wrong: A Five-Step Guide to Planning for and Surviving the Inevitable?And Coming Out Ahead
What to Do When Things Go Wrong: A Five-Step Guide to Planning for and Surviving the Inevitable?And Coming Out Ahead
Manage every business problem like you were born for it?from a problem customer to a career-threatening crisis


It’s not being negative or pessimistic to assume that something will always go wrong in business and in your career. It’s being realistic. What you do when crisis
...
Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Python Data Analysis
Python Data Analysis

Key Features

  • Find, manipulate, and analyze your data using the Python 3.5 libraries
  • Perform advanced, high-performance linear algebra and mathematical calculations with clean and efficient Python code
  • An easy-to-follow guide with realistic examples that are frequently used in real-world data...
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps

A hands-on guide with a minimalist and flexible approach that enables quick learning and rapid delivery of cloud-ready enterprise applications with Angular 6

Key Features

  • Explore tools and techniques to push your web app to the next level
  • Master Angular app design and...
Big Data Analysis with Python: Combine Spark and Python to unlock the powers of parallel computing and machine learning
Big Data Analysis with Python: Combine Spark and Python to unlock the powers of parallel computing and machine learning

Get to grips with processing large volumes of data and presenting it as engaging, interactive insights using Spark and Python.

Key Features

  • Get a hands-on, fast-paced introduction to the Python data science stack
  • Explore ways to create useful metrics and statistics from...
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Learn the business and technical importance of API design and architecture using the available cloud services from Azure and AWS.

This book starts off with an introduction to APIs and the concept of API Economy from a business and organizational perspective. You'll decide on a sustainable API strategy and API
...
Program Evaluation for Social Workers: Foundations of Evidence-Based Programs
Program Evaluation for Social Workers: Foundations of Evidence-Based Programs
Over the course of 20 years and eight editions, the goals of the book have remained the same: to prepare students to participate in evaluative activities within their organizations, become beginning critical producers and consumers of the professional evaluative literature, and reap the benefits of more advanced evaluation courses and...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Machine Learning for Finance: Principles and practice for financial insiders
Machine Learning for Finance: Principles and practice for financial insiders

A guide to advances in machine learning for financial professionals, with working Python code

Key Features

  • Explore advances in machine learning and how to put them to work in financial industries
  • Clear explanation and expert discussion of how machine learning works, with...
Result Page: 102 101 100 99 98 97 96 95 94 93 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy