After over fifteen years of research and trial and error,
micromap designs have evolved to the point where they
are slowly finding their way into mainstream statistical
visualizations. Now seems to be a good time to pull
all of the work together into a book in order to introduce
micromaps to a wide range of people interested in...
With all the fantastic Cisco documentation available online, why does the world of
UCCE need this book? UCCE is such a big topic that it would be easy to think that it is
possible to try and cover absolutely everything. Unfortunately, this would turn this book
into nothing more than a product reference manual that could potentially be...
As I look back on my career at Microsoft, I feel fortunate
to have had a front-row seat to witness an incredible
shift in how people and organizations communicate and interact.
I started at Microsoft in October 1994—about a year after
America Online released AOL 1.0 for Windows. As early adopters
of social media,...
A state-of-the-art introduction to the powerful mathematical and statistical tools used in the field of finance
The use of mathematical models and numerical techniques is a practice employed by a growing number of applied mathematicians working on applications in finance. Reflecting this development, Numerical Methods in Finance and...
Privacy is a basic human need, and losing privacy is perceived as an extremely
threatening experience. Privacy embraces solitude, personal space, or intimacy with
family and friends and as such, it is a ubiquitous and trans-cultural phenomenon.
Privacy leverages well-being; without privacy we are at risk of becoming physically
or...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
This course is the official courseware for the Security Certified Program SC0-451
certification exam. The Tactical Perimeter Defense course is designed to provide
network administrators and certification candidates with hands-on tasks on the
most fundamental perimeter security technologies. The network perimeter is often
the first...
When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
My journey down the social media road began years
ago, and many people have praised me for my foresight
and brilliance. They are very kind, but the
truth is, what really took me down this road was desperation.
A few years ago—perhaps you remember—the economy
took a heck of a dip. On its way down, it punched me in the...
I am delighted that Jonathan and Robb undertook the task of writing this book. Both Jonathan and Robb have been involved in the .NET community for a number of years and developed a passion for the Windows Phone. With this book, they have decided to share their knowledge and experience with their readers to help developers dive into doing more...