Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Data Mining: A Knowledge Discovery Approach
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First, “long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Computer Security Handbook, Set
Computer Security Handbook, Set

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer...

Machine Learning for Finance: Principles and practice for financial insiders
Machine Learning for Finance: Principles and practice for financial insiders

A guide to advances in machine learning for financial professionals, with working Python code

Key Features

  • Explore advances in machine learning and how to put them to work in financial industries
  • Clear explanation and expert discussion of how machine learning works, with...
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems.

Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects
...
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)
Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)

Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health...

Creating Facebook applications - 100 Success Secrets to creating Awesome Facebook Applications and leverage Social Media
Creating Facebook applications - 100 Success Secrets to creating Awesome Facebook Applications and leverage Social Media
Facebook is a very popular social networking site. There are millions of users who have joined this site for a good number of reasons: to stay in touch, create new relationships and interact with one another. The last reason is probably the most important reason of all – which is why so many Facebook application companies have decided to...
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)

This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future development of advanced smart grids that operated in a peer-to-peer fashion,...

The Economics of Information Security and Privacy
The Economics of Information Security and Privacy

In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Result Page: 38 37 36 35 34 33 32 31 30 29 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy