Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention

Turn unstructured data into valuable business insight

Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms, Volume 1
Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms, Volume 1
The aim of Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms is to present recent developments in cell survival and apoptotic pathways and their involvement in human diseases, such as cancers and neurodegenerative disorders. This requires an integration of knowledge from several fields of research, including...
Using Game Theory to Improve Safety within Chemical Industrial Parks
Using Game Theory to Improve Safety within Chemical Industrial Parks

Though the game-theoretic approach has been vastly studied and utilized in relation to economics of industrial organizations, it has hardly been used to tackle safety management in multi-plant chemical industrial settings. Using Game Theory for Improving Safety within Chemical Industrial Parks presents an in-depth discussion of...

Managing Skin Cancer
Managing Skin Cancer

Skin cancer is the most common malignant neoplasm and its incidence is rising worldwide. The epidemic increase in such tumors calls for efficient management by the application of appropriate guidelines for therapy and prevention. Clinicians managing these patients need to keep up to date with the latest advances, allowing them to provide optimal...

Cancer of the Gastrointestinal Tract: A Handbook for Nurse Practitioners (Handbook for Nurse Practitioners Series (Whurr))
Cancer of the Gastrointestinal Tract: A Handbook for Nurse Practitioners (Handbook for Nurse Practitioners Series (Whurr))

This text is a primer on the care of the patient with cancer of the gastrointestinal tract, for nurses who may not have experience in this demanding speciality.

The book begins with a comprehensive look at the issues and scope of the frequently used term "quality of life". Chapters two and three take an in-depth look at...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Emerging Pathologies in Cardiology: Proceedings of the Mediterranean Cardiology Meeting 2005
Emerging Pathologies in Cardiology: Proceedings of the Mediterranean Cardiology Meeting 2005

Clinical practice is evolving at a rapid pace,nowhere more so than in the field of cardiology.Acute Coronary Syndromes, Sudden Cardiac Death, Heart Failure, Atrial Fibrillation,Syncope,and Prevention of Global Cardiovascular Risk are the main Emerging Pathologies to which many investigators are addressing their researches. Less than 10 years...

Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy