Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Forest Analytics with R: An Introduction (Use R!)
Forest Analytics with R: An Introduction (Use R!)
R is an open-source and free software environment for statistical computing and graphics. R compiles and runs on a wide variety of UNIX platforms (e.g., GNU/Linux and FreeBSD), Windows, and Mac OSX. Since the late 1990s, R has been developed by hundreds of contributors and new capabilities are added each month....
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Machine Learning in Action
Machine Learning in Action

After college I went to work for Intel in California and mainland China. Originally my plan was to go back to grad school after two years, but time flies when you are having fun, and two years turned into six. I realized I had to go back at that point, and I didn’t want to do night school or online learning, I wanted to sit on...

Domain-Driven Design Distilled
Domain-Driven Design Distilled

Domain-Driven Design (DDD) software modeling delivers powerful results in practice, not just in theory, which is why developers worldwide are rapidly moving to adopt it. Now, for the first time, there’s an accessible guide to the basics of DDD: What it is, what problems it solves, how it works, and how to quickly...

The Basics of Digital Forensics, Second Edition: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics, Second Edition: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers,...

Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)
Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)

An interactive guide to successfully trading in today's markets

Mastering the Art of Equity Trading Through Simulation is a guidebook to interactive computer trading simulation designed to provide participants with hands-on experience in making tactical decisions and implementing them in different market...

Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
The business environment has changed. Sharper competition requires organizations to exhibit greater effectiveness in their operations and services and faster creation of new products and servicesall hallmarks of the knowledge economy. Up until now, most of the knowledge management literature has focused on technology, systems, or culture. This book...
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy