If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk...
A new edition of the essential text and professional reference, with substantial new material on such topics as vEB trees, multithreaded algorithms, dynamic programming, and edge-based flow.
Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms...
With an analytical and rigorous approach to problem solving and programming techniques, this book is oriented toward engineering. Structure and Interpretation of Computer Programs emphasizes the central role played by different approaches to dealing with time in computational models. Its unique approach makes it appropriate for an...
Create Thriving, High-Performing Teams and Organizations with Scrumban
Scrumban allows you to use Kanban as a catalyst for increasingly valuable changes to your existing software development processes, amplifying and expanding upon Scrum’s...
This is an introductory to intermediate level text on the scienceof image processing, which employs the Matlab programming languageto illustrate some of the elementary, key concepts in modern imageprocessing and pattern recognition. The approach taken isessentially practical and the book offers a framework within whichthe concepts can be...
Covering theory, algorithms, and methodologies, as well as data mining technologies, Data Mining for Bioinformatics provides a comprehensive discussion of data-intensive computations used in data mining with applications in bioinformatics. It supplies a broad, yet in-depth, overview of the application domains of data mining...
Written for drug developers rather than computer scientists, this monograph adopts a systematic approach to mining scientifi c data sources, covering all key steps in rational drug discovery, from compound screening to lead compound selection and personalized medicine. Clearly divided into four sections, the first part discusses the different...
Leading experts illustrate how sophisticated computational data mining techniques can impact contemporary drug discovery and development
In the era of post-genomic drug development, extracting and applying knowledge from chemical, biological, and clinical data is one of the greatest challenges facing the pharmaceutical industry....
Actionable guidance and expert perspective for real-world cybersecurity
The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...
The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...
Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...
Streamline data analysis with an intuitive, visual Six Sigma strategy
Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...