Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

Add cybersecurity to your value proposition and protect your company from cyberattacks

Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and...

MCSE Training Kit-Microsoft Windows XP Professional
MCSE Training Kit-Microsoft Windows XP Professional

Official Microsoft study guide for the skills you need on the job—and on the exam.

Learn how to set up and support the Windows® XP Professional operating system—and prepare for the Microsoft® Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your own pace...

Node.js in Action
Node.js in Action

Summary

Node.js in Action is an example-driven tutorial that starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. You'll start by learning how to set up your Node development environment, including loading...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Software Engineering and Computer Games
Software Engineering and Computer Games

"This book should be a requirement of anyone that wants to write games-period"-Andre Lamothe, author and CEO of Xtreme Games

Software Engineering and Computer Games was written with four broad goals:

  • To teach a lively...

Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python

Gain experience of building a next-generation collaboration robot

Key Features

  • Get up and running with the fundamentals of robotic programming
  • Program a robot using Python and the Raspberry Pi 3
  • Learn to build a smart robot with interactive and AI-enabled...
Programming Ruby: A Pragmatic Programmer's Guide
Programming Ruby: A Pragmatic Programmer's Guide
This book is a tutorial and reference for the Ruby programming language. Use Ruby, and you'll write better code, be more productive, and enjoy programming more.

These are bold claims, but we think that after reading this book you'll agree with them. And we have the experience to back up this belief.

As Pragmatic
...
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
Practical Standards for Microsoft Visual Basic .NET
Practical Standards for Microsoft Visual Basic .NET

Microsoft Visual Basic has the largest user base of any development language in the world, and the ranks are growing. Estimates put the number of users of Visual Basic at about 3 million. Once considered a hobbyist's language, Visual Basic has quickly gained the respect of serious developers and is now widely used in...

.NET & J2EE Interoperability
.NET & J2EE Interoperability

Achieve integration between the platform-independent technologies J2EE and .NET. Technically reviewed by both Microsoft and Sun technologists, this one-of-a-kind resource provides solutions to cross-platform communications between business partners and the transmission of mission-critical enterprise data. Using a case study to provide a...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Software Project Management in Practice
Software Project Management in Practice

We often hear about software projects that are late, over budget, or unable to satisfy customer needs. Yet some organizations are able to manage project after project successfully with desired results. In this book, Pankaj Jalote looks at one such organization, Infosys...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy