Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Food Composition and Analysis: Methods and Strategies
Food Composition and Analysis: Methods and Strategies

This book covers methods and strategies related to food composition and analysis. Topics include antioxidant activity of maize bran arabinoxylan microspheres; active packaging based on the release of carvacrol and thymol for fresh food; enzymes for the flavor, dairy, and baking industries; membrane technology in food processing; tenderization...

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Project Management Absolute Beginner's Guide (3rd Edition)
Project Management Absolute Beginner's Guide (3rd Edition)

Succeed as a project manager, even if you’ve never run a project before! This book is the fastest way to master every project management task, from upfront budgeting and scheduling through execution, managing teams through closing projects, and learning from experience. Updated for the latest web-based project...

PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction
PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

Key Features

  • Learn the concepts of PostgreSQL 11 with lots of real-world datasets and examples
  • Learn queries,...
Calculated Risks: How to Know When Numbers Deceive You
Calculated Risks: How to Know When Numbers Deceive You
At the beginning of the twentieth century, H. G. Wells predicted that statistical thinking would be as necessary for citizenship in a technological world as the ability to read and write. But in the twenty-first century, we are often overwhelmed by a baffling array of percentages and probabilities as we try to navigate in a world dominated...
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)
I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)

Get the brutal truth about coding, testing, and project management—from a Microsoft insider who tells it like it is. I. M. Wright's deliberately provocative column "Hard Code" has been sparking debate amongst thousands of engineers at Microsoft for years. And now (despite our better instincts), we're making...

Result Page: 48 47 46 45 44 43 42 41 40 39 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy