Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention

Turn unstructured data into valuable business insight

Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Understanding Diabetes: A Biochemical Perspective
Understanding Diabetes: A Biochemical Perspective

A clear explanation of the cause, diagnosis, and treatment of diabetes

Written for a broad range of readers, including students, researchers, policymakers, health care providers, and diabetes patients and caregivers, this book explains the underlying biochemistry and physiology of diabetes mellitus. Each chapter contains a...

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Managing Information Security, Second Edition
Managing Information Security, Second Edition

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers...

Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed...
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Obstetrics and Gynaecology (Lecture Notes)
Obstetrics and Gynaecology (Lecture Notes)

"Lecture Notes: Obstetrics and Gynaecology" provides a concise introduction to obstetrics and gynaecology for medical students and junior doctors. Six sections examine the female development from the early years to old age. The text starts with a section on Basic Science. Self-assessment questions are found throughout the text to...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Result Page: 30 29 28 27 26 25 24 23 22 21 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy