Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining and Statistics for Decision Making
Data Mining and Statistics for Decision Making
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Data mining is usually associated with a business or an organization's need to identify...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Lessons in Project Management
Lessons in Project Management

Most of the project management books on the market are basically textbooks. They are dry to begin with, and don't focus on the practical advice that most people need to run their projects. Lessons in Project Management, Second Edition does not assume that you are a project manager building a nuclear reactor or sending a...

Python for Finance: Analyze Big Financial Data
Python for Finance: Analyze Big Financial Data

The financial industry has adopted Python at a tremendous rate recently, with some of the largest investment banks and hedge funds using it to build core trading and risk management systems. This hands-on guide helps both developers and quantitative analysts get started with Python, and guides you through the most important aspects...

Derivatives Analytics with Python: Data Analysis, Models, Simulation, Calibration and Hedging (The Wiley Finance Series)
Derivatives Analytics with Python: Data Analysis, Models, Simulation, Calibration and Hedging (The Wiley Finance Series)

Supercharge options analytics and hedging using the power ofPython

Derivatives Analytics with Python shows you how toimplement market-consistent valuation and hedging approaches usingadvanced financial models, efficient numerical techniques, and thepowerful capabilities of the Python programming language. Thisunique...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Financial Modelling in Python (The Wiley Finance Series)
Financial Modelling in Python (The Wiley Finance Series)

"Fletcher and Gardner have created a comprehensive resource that will be of interest not only to those working in the field of finance, but also to those using numerical methods in other fields such as engineering, physics, and actuarial mathematics. By showing how to combine the high-level elegance, accessibility, and flexibility of...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services
Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services
Service-oriented integration with less cost and less risk

  

The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA...

Connecting the Dots: Aligning Projects with Objectives in Unpredictable Times
Connecting the Dots: Aligning Projects with Objectives in Unpredictable Times

Are you ever going to see the value promised from your company’s project portfolio?

The question is all too familiar. The concern is real and legitimate. Technology and other project initiatives have grown faster than the ability of most companies to manage them—affecting the return on the investment of trillions of dollars...

Result Page: 91 90 89 88 87 86 85 84 83 82 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy