Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Analytics: The Agile Way (Wiley and SAS Business Series)
Analytics: The Agile Way (Wiley and SAS Business Series)
For decades now, companies big and small have embraced Agile software development methods. The rationale here is straightforward:
  • Why take one or two years to fully deploy a system, app, or website when so many things can and do go wrong?
  • Why try to cook one big batch and boil the ocean?
  • ...
Hadoop Real World Solutions Cookbook - Second Edition
Hadoop Real World Solutions Cookbook - Second Edition

Key Features

  • Implement outstanding Machine Learning use cases on your own analytics models and processes.
  • Solutions to common problems when working with the Hadoop ecosystem.
  • Step-by-step implementation of end-to-end big data use cases.

Who This Book Is For

...

Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Learning Scrapy
Learning Scrapy

Key Features

  • Extract data from any source to perform real time analytics.
  • Full of techniques and examples to help you crawl websites and extract data within hours.
  • A hands-on guide to web scraping and crawling with real-life problems and solutions

Book Description

...
Building Python Real-Time Applications with Storm
Building Python Real-Time Applications with Storm

Learn to process massive real-time data streams using Storm and Python―no Java required!

About This Book

  • Learn to use Apache Storm and the Python Petrel library to build distributed applications that process large streams of data
  • Explore sample applications in real-time and analyze...
Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

BDD in Action: Behavior-driven development for the whole software lifecycle
BDD in Action: Behavior-driven development for the whole software lifecycle

Summary

BDD in Action teaches you the Behavior-Driven Development model and shows you how to integrate it into your existing development process. First you'll learn how to apply BDD to requirements analysis to define features that focus your development efforts on underlying business goals. Then,...

Design and Development of Aircraft Systems (Aerospace Series)
Design and Development of Aircraft Systems (Aerospace Series)

Now covering both conventional and unmanned systems, this is a significant update of the definitive book on aircraft system design

Design and Development of Aircraft Systems, Second Edition is for people who want to understand how industry develops the customer requirement into a fully integrated, tested, and...

Programming Applications for Microsoft Office Outlook 2007
Programming Applications for Microsoft Office Outlook 2007

Microsoft Office Outlook 2007 offers compelling new product features including Instant Search, task flagging, the To-Do Bar, Calendar overlays, sharing with friends and coworkers, Really Simple Syndication (RSS) feeds, Electronic Business Cards, Microsoft Office SharePoint Server integration, and plenty of other features that make Outlook...

Software Engineering and Computer Games
Software Engineering and Computer Games

"This book should be a requirement of anyone that wants to write games-period"-Andre Lamothe, author and CEO of Xtreme Games

Software Engineering and Computer Games was written with four broad goals:

  • To teach a lively...

The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations
The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations

The introvert is a personality type that draws energy from the outside inward. According to standard personality testing assessments, most people are introverts and no group is more introverted than technical professionals. Introverts are congenitally programmed to recoil from the prospect of public speaking with fear and loathing, yet making...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy