 |
|
 System Requirements Analysis, Second Edition
System Requirements Analysis gives the professional systems engineer the tools to set up a proper and effective analysis of the resources, schedules and parts needed to successfully undertake and complete any large, complex project. This fully revised text offers readers the methods for rationally breaking down a large project into a... |  |  Hyper-V for VMware Administrators: Migration, Coexistence, and Management
Learn to deploy and support Hyper-V, building on what you know about VMware's vSphere. Whether you're looking to run both hypervisors in parallel or migrate completely, Hyper-V for VMware Administrators has everything you need to get started.
The book begins with an overview of Hyper-V basics, including common... |  |  Cuckoo Malware Analysis
Analyze malware using Cuckoo Sandbox
Overview
-
Learn how to analyze malware in a straightforward way with minimum technical skills
-
Understand the risk of the rise of document-based malware
-
Enhance your malware analysis concepts through illustrations, tips and tricks,...
|
|
|
 Docker in Action
Summary
Docker in Action teaches readers how to create, deploy, and manage applications hosted in Docker containers.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
The idea behind... |  |  |  |  Developing Analytic Talent: Becoming a Data Scientist
Learn what it takes to succeed in the the most in-demand tech job
Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT... |
|
 Online Game Pioneers at Work
In this groundbreaking collection of 15 interviews, successful founders of entertainment software companies reflect on their challenges and how they survived. You will learn of the strategies, the sacrifices, the long hours, the commitment, and the dedication to quality that led to their successes but also of the toll that this incredibly ... |  |  Bipolar II Disorder: Modelling, Measuring and Managing
The lifetime risk of developing bipolar II disorder is 5-7%, yet the condition is often poorly detected. Mood elevation states are less extreme than in bipolar I disorder although the depressive episodes are usually severe. When correctly treated, the outcome is positive, but bipolar II is often poorly managed, resulting in a high suicide... |  |  Cloud Storage Forensics
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the... |
|
| Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 |