Home | Amazing | Today | Tags | Publishers | Years | Search 
Medical Data Sharing, Harmonization and Analytics
Medical Data Sharing, Harmonization and Analytics

Medical Data Sharing, Harmonization and Analytics serves as the basis for understanding the rapidly evolving field of medical data harmonization combined with the latest cloud infrastructures for storing the harmonized (shared) data. Chapters cover the latest research and applications on data sharing and protection in the...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

The concept of Smart Cities is accurately regarded as a potentially transformative power all over the world. Bustling metropolises infused with the right combination of the Internet of Things, artificial intelligence, big data, and blockchain promise to improve both our daily lives and larger structural operations at a city...

Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...

The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and...
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition

Understand the fundamentals of Kubernetes deployment on Azure with a learn-by-doing approach

Key Features

  • Get to grips with the fundamentals of containers and Kubernetes
  • Deploy containerized applications using the Kubernetes platform
  • Learn how you can...
  
   
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy