Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python for Finance: Mastering Data-Driven Finance
Python for Finance: Mastering Data-Driven Finance

The financial industry has recently adopted Python at a tremendous rate, with some of the largest investment banks and hedge funds using it to build core trading and risk management systems. Updated for Python 3, the second edition of this hands on book helps you get started with the language, guiding developers and...

Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention
Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention
Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention is an informative and practical introduction to the topics of Internet gaming disorder and problematic gaming. This book provides mental health clinicians with hands-on assessment, prevention, and treatment techniques for clients with problematic gaming behaviors...
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)

Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally

This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments,...

We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
"A wise and thorough investigation." - Lawrence Wright, author of The Looming Tower and The Terror Years

Starting in late 2012, Westerners working in Syria -- journalists and aid workers -- began disappearing without a trace. A year later the world learned they had been taken hostage by the
...
Banned from Ebay: How to Create a New Account and Get Back on PayPal and eBay after Being Limited or Suspended
Banned from Ebay: How to Create a New Account and Get Back on PayPal and eBay after Being Limited or Suspended
After reading Banned from eBay you will learn to anonymously sell on eBay without the risk of getting suspended again. If have been limited by PayPal then you will also be able to get back on PayPal after you have applied the information provided throughout this book. Given that you apply all the tactics and follow the outlined step by step...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
A hands-on guide to testing techniques that deliver reliable software and systems

Testing even a simple system can quickly turn into a potentially infinite task. Faced with tight costs and schedules, testers need to have a toolkit of practical techniques combined with hands-on experience and the right strategies...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Introduction to Online Payments Risk Management
Introduction to Online Payments Risk Management

If you've been tasked with building a team to handle risk management for online payments (RMP), this practical introduction provides a framework for choosing the technologies and personnel you need. Author and financial services executive Ohad Samet explains the components of payments risk management, and presents a coherent...

Result Page: 96 95 94 93 92 91 90 89 88 87 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy