Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Rely on this robust and thorough guide to build and maintain successful test automation. As the software industry shifts from traditional waterfall paradigms into more agile ones, test automation becomes a highly important tool that allows your development teams to deliver software at an ever-increasing pace without compromising...
How to Compete in the Age of Artificial Intelligence: Implementing a Collaborative Human-Machine Strategy for Your Business
How to Compete in the Age of Artificial Intelligence: Implementing a Collaborative Human-Machine Strategy for Your Business
Get started with artificial intelligence in your business. This book will help you understand AI, its implications, and how to adopt a strategy that is rational, relevant, and practical.

Beyond the buzzwords and the technology complexities, organizations are struggling to understand what AI means for their industry...
Python Data Science Essentials: A practitioner's guide covering essential data science principles, tools, and techniques, 3rd Edition
Python Data Science Essentials: A practitioner's guide covering essential data science principles, tools, and techniques, 3rd Edition

Gain useful insights from your data using popular data science tools

Key Features

  • A one-stop guide to Python libraries such as pandas and NumPy
  • Comprehensive coverage of data science operations such as data cleaning and data manipulation
  • Choose scalable...
Content Networking in the Mobile Internet
Content Networking in the Mobile Internet

A cutting-edge guide to the next generation Mobile Internet architecture and applications

The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is...

Modern Business Management: Creating a Built-to-Change Organization
Modern Business Management: Creating a Built-to-Change Organization

Transform your entire organization, not just a part of it. Take a modern look now that the world is focusing on business agility rather than thinking about team-level or even scaled Agile.

Many people and businesses believe that “doing Agile” will solve all their business and organizational problems. The...

MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)
MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)

The study guide helps you master all the topics on the MCSA 70-410 exam, including the following:

  • Installing and configuring Windows Server 2012
  • Configuring storage, shares, and permissions
  • ...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System

The Only Up-to-the-Minute Guide to IMS Version 9--Straight from IBM IMS Experts

  • Introduces IMS, one of the world's premiere software products
  • Thoroughly covers key IMS functions, from security to Java support
  • For both new and experienced IMS...
Integrated Business Processes with ERP Systems
Integrated Business Processes with ERP Systems
As more and more businesses around the world adopt enterprise systems, it becomes increasingly important for students to develop a more process-centric perspective that refl ects the realities of the modern business environment in which they will work. Because business operations and enterprise systems are so tightly...
Guide to Essential Math: A Review for Physics, Chemistry and Engineering Students (Complementary Science)
Guide to Essential Math: A Review for Physics, Chemistry and Engineering Students (Complementary Science)
This book reminds students in junior, senior and graduate level courses in physics, chemistry and engineering of the math they may have forgotten (or learned imperfectly) which is needed to succeed in science courses.

This book reminds students in junior, senior and graduate level courses in physics, chemistry and engineering
...
CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Result Page: 47 46 45 44 43 42 41 40 39 38 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy