Home | Amazing | Today | Tags | Publishers | Years | Search 
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk...

Introduction to Algorithms, Third Edition (International Edition)
Introduction to Algorithms, Third Edition (International Edition)

A new edition of the essential text and professional reference, with substantial new material on such topics as vEB trees, multithreaded algorithms, dynamic programming, and edge-based flow.

Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms...

Structure and Interpretation of Computer Programs, Second Edition
Structure and Interpretation of Computer Programs, Second Edition

With an analytical and rigorous approach to problem solving and programming techniques, this book is oriented toward engineering. Structure and Interpretation of Computer Programs emphasizes the central role played by different approaches to dealing with time in computational models. Its unique approach makes it appropriate for an...

The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)
The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)

Create Thriving, High-Performing Teams and Organizations with Scrumban

 

Scrumban allows you to use Kanban as a catalyst for increasingly valuable changes to your existing software development processes, amplifying and expanding upon Scrum’s...

Fundamentals of Digital Image Processing: A Practical Approach with Examples in Matlab
Fundamentals of Digital Image Processing: A Practical Approach with Examples in Matlab

This is an introductory to intermediate level text on the scienceof image processing, which employs the Matlab programming languageto illustrate some of the elementary, key concepts in modern imageprocessing and pattern recognition. The approach taken isessentially practical and the book offers a framework within whichthe concepts can be...

Data Mining for Bioinformatics
Data Mining for Bioinformatics

Covering theory, algorithms, and methodologies, as well as data mining technologies, Data Mining for Bioinformatics provides a comprehensive discussion of data-intensive computations used in data mining with applications in bioinformatics. It supplies a broad, yet in-depth, overview of the application domains of data mining...

Data Mining in Drug Discovery
Data Mining in Drug Discovery

Written for drug developers rather than computer scientists, this monograph adopts a systematic approach to mining scientifi c data sources, covering all key steps in rational drug discovery, from compound screening to lead compound selection and personalized medicine. Clearly divided into four sections, the first part discusses the different...

Pharmaceutical Data Mining: Approaches and Applications for Drug Discovery
Pharmaceutical Data Mining: Approaches and Applications for Drug Discovery

Leading experts illustrate how sophisticated computational data mining techniques can impact contemporary drug discovery and development

In the era of post-genomic drug development, extracting and applying knowledge from chemical, biological, and clinical data is one of the greatest challenges facing the pharmaceutical industry....

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Streamline data analysis with an intuitive, visual Six Sigma strategy

Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...

Result Page: 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy