Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning for Finance: Principles and practice for financial insiders
Machine Learning for Finance: Principles and practice for financial insiders

A guide to advances in machine learning for financial professionals, with working Python code

Key Features

  • Explore advances in machine learning and how to put them to work in financial industries
  • Clear explanation and expert discussion of how machine learning works, with...
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
PostGIS Cookbook - Second Edition: Store, organize, manipulate, and analyze spatial data
PostGIS Cookbook - Second Edition: Store, organize, manipulate, and analyze spatial data

Create and manage spatial data with PostGIS

Key Features

  • Import and export geographic data from the PostGIS database using the available tools
  • Maintain, optimize, and fine-tune spatial data for long-term viability
  • Utilize the parallel support functionality...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Learn iOS 11 Programming with Swift 4 - Second Edition: Learn the fundamentals of iOS app development with Swift 4 and Xcode 9
Learn iOS 11 Programming with Swift 4 - Second Edition: Learn the fundamentals of iOS app development with Swift 4 and Xcode 9

Begin your iOS development journey using Swift 4 and XCode 9 with this easy to learn, practical guide.

Key Features

  • Explore the latest features of iOS 11 and Swift 4 to build robust applications
  • Kickstart your iOS development career by building your first application from...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

Real World ASP.NET: Building a Content Management System
Real World ASP.NET: Building a Content Management System
Aimed at aspiring .NET developers who want to work with content management (CM) applications, Real-World ASP.NET: Building a Content Management System provides a fine overview of what's involved in managing Web site content and also delivers working code for a free, proprietary CMS using the latest in .NET technology and C#.

With...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

Result Page: 38 37 36 35 34 33 32 31 30 29 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy