Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Improving Your Written English: How to Ensure Your Grammar, Punctuation and Spelling Are Up to Scratch
Improving Your Written English: How to Ensure Your Grammar, Punctuation and Spelling Are Up to Scratch

This user-friendly book offers help to anyone who needs to brush up on his or her English. Written in short, easily understandable sections, it deals with the basics of writing good English. There are sections on punctuation, sentence construction, and spelling. All the common pitfalls are tackled, such as when to use apostrophes and how to...

Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS

Leverage the capabilities of SAS to process and analyze Big Data

About This Book

  • Combine SAS with platforms such as Hadoop, SAP HANA, and Cloud Foundry-based platforms for effecient Big Data analytics
  • Learn how to use the web browser-based SAS Studio and iPython Jupyter Notebook...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

BIRT: A Field Guide to Reporting (The Eclipse Series)
BIRT: A Field Guide to Reporting (The Eclipse Series)

The first in a two-book series about Business Intelligence and Reporting Technology, BIRT: A Field Guide to Reporting introduces reporting to a broad base of users. Built on the Eclipse platform, this exciting technology makes it possible for programmers and non-programmers to build and deploy complex reports with...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Foundations of Computer Science: C Edition (Principles of Computer Science Series)
Foundations of Computer Science: C Edition (Principles of Computer Science Series)
Aho and Ullman have created a C version of their groundbreaking text. As in that text, this book combines the theoretical foundations of computing with essential discrete mathematics. It follows the same organizations as its predecessor, with all examples and exercises in C.

This book was motivated by the desire we and others have had to
...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
Beginning COBOL for Programmers
Beginning COBOL for Programmers

Beginning COBOL for Programmers is a comprehensive, sophisticated tutorial and modular skills reference on the COBOL programming language for established programmers. This book is for you if you are a developer who would like to—or must—add COBOL to your repertoire. Perhaps you recognize the opportunities presented by the...

Cosmology
Cosmology
This book is unique in the detailed, self-contained, and comprehensive treatment that it gives to the ideas and formulas that are used and tested in modern cosmological research. It divides into two parts, each of which provides enough material for a one-semester graduate course. The first part deals chiefly with the isotropic and homogeneous...
Getting Up To Speed: The Future Of Supercomputing
Getting Up To Speed: The Future Of Supercomputing
High-performance computing is important in solving complex problems in areas from climate and biology to national security. Several factors have led to the recent reexamination of the rationale for federal investment in research and development in support of high-performance computing, including continuing changes in the various component...
Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Result Page: 55 54 53 52 51 50 49 48 47 46 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy