Home | Amazing | Today | Tags | Publishers | Years | Search 
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Discover how to detect fraud, biases, or errors in your data using Access or Excel

With over 300 images, Forensic Analytics reviews and shows how twenty substantive and rigorous tests can be used to detect fraud, errors, estimates, or biases in your data. For each test, the original data is shown with the steps needed to get to the...

Systems Engineering Tools and Methods (Engineering and Management Innovations)
Systems Engineering Tools and Methods (Engineering and Management Innovations)

With coverage that draws from diverse disciplines, Systems Engineering Tools and Methods demonstrates how, using integrated or concurrent engineering methods, you can empower development teams. Copiously illustrated with figures, charts, and graphs, the book offers methods, frameworks, techniques, and tools for designing,...

Rapid Psychiatry
Rapid Psychiatry

"Rapid Psychiatry" is the fifth title in the "Rapid" series of short revision notes books, covering key information in a simple and easily accessible format, using a mnemonic to aid recall. This book provides an excellent revision tool in the run-up to exams, but is also useful for clinical students working on their...

Monitoring Water Quality: Pollution Assessment, Analysis, and Remediation
Monitoring Water Quality: Pollution Assessment, Analysis, and Remediation

Monitoring Water Quality is a practical assessment of one of the most pressing growth and sustainability issues in the developed and developing worlds: water quality. Over the last 10 years, improved laboratory techniques have led to the discovery of microbial and viral contaminants, pharmaceuticals, and endocrine disruptors in our...

Green Information Technology: A Sustainable Approach
Green Information Technology: A Sustainable Approach

We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres)...

The South Texas Health Status Review: A Health Disparities Roadmap
The South Texas Health Status Review: A Health Disparities Roadmap

This book is a roadmap of the exact health disparities that burden the health of South Texas residents, especially Hispanics, compared to the rest of Texas and nation. This type of knowledge has the potential to fuel and motivate researchers and public health leaders to create and shape interventions to reverse those health disparities. Most...

Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE: Developing Cyber-Physical Systems (The MK/OMG Press)
Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE: Developing Cyber-Physical Systems (The MK/OMG Press)

Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software.

...
Introduction to Information Security: A Strategic-Based Approach
Introduction to Information Security: A Strategic-Based Approach

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical...

Food Additives Data Book
Food Additives Data Book

The use of additives in food is a dynamic one, as consumers demand fewer additives in foods and as governments review the list of additives approved and their permitted levels. Scientists also refine the knowledge of the risk assessment process as well as improve analytical methods and the use of alternative additives, processes or...

Perspectives in Cancer Prevention-Translational Cancer Research
Perspectives in Cancer Prevention-Translational Cancer Research

Being a complex disease that affects millions of people world over, cancer research has assumed great significance. Translational cancer research transforms scientific discoveries in the laboratory or population studies into clinical application to reduce incidence of cancer , morbidity and mortality. It is becoming increasingly evident that...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Mastering Metasploit
Mastering Metasploit

With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
Overview

  • Develops Real World Approaches to Penetration testing using Metasploit
  • ...
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy