Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Professional Financial Computing Using Excel and VBA
Professional Financial Computing Using Excel and VBA

"Professional Financial Computing Using Excel and VBA is an admirable exposition that bridges the theoretical underpinnings of financial engineering and its application which usually appears as a "black-box" software application. The book opens the black-box and reveals the architecture of risk-modeling and financial...

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

Cloud Architecture Patterns: Using Microsoft Azure
Cloud Architecture Patterns: Using Microsoft Azure
This book focuses on the development of cloud-native applications. A cloud-native ap plication is architected to take advantage of specific engineering practices that have proven successful in some of the world’s largest and most successful web properties. Many of these practices are unconventional, yet the...
Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

Forex for Beginners: A Comprehensive Guide to Profiting from the Global Currency Markets
Forex for Beginners: A Comprehensive Guide to Profiting from the Global Currency Markets

"Backed by a comprehensive list of studies, this book is a brilliant contribution on the connections between exchange rates and economics."

—Francesc Riverola, CEO and Founder of FXstreet.com
 

"Adam Kritzer has been covering the forex market for years as a...
Trading For Dummies
Trading For Dummies

Trade your way to a more profitable portfolio

Savvy traders can make money in both up and down markets—and now you can, too! In Trading For Dummies, investors from every walk of life will benefit from sample stock charts, position trading tips and techniques, fresh ways to analyze trends and indicators, and all...

Investing Demystified
Investing Demystified
The first Demystified guide to take the mystery out of investing, Investing Demystified provides independent investors with hands-on explanations of basic investing topics without needless detours. Built around the no-nonsense model that has made Demystified one of McGraw-Hill's most popular series, this helpful and practical self-teaching guide...
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

Testing Extreme Programming
Testing Extreme Programming

Testing Extreme Programming is a practical tutorial that gives software builders a lucid understanding of this important aspect of development. This book demonstrates how testing is central to the XP project, clearly spelling out what testing should be done and when and how it should be...

SQL Server Query Performance Tuning
SQL Server Query Performance Tuning

Queries not running fast enough? Wondering about the in-memory database features in 2014? Tired of phone calls from frustrated users? Grant Fritchey’s book SQL Server Query Performance Tuning is the answer to your SQL Server query performance problems. The book is revised to cover the very latest in performance optimization...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Result Page: 90 89 88 87 86 85 84 83 82 81 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy