Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Threat Modeling: Designing for Security
Threat Modeling: Designing for Security

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he
...

Plan, Activity, and Intent Recognition: Theory and Practice
Plan, Activity, and Intent Recognition: Theory and Practice

Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning.

Plan, Activity, and Intent Recognition...

JavaFX 8: Introduction by Example
JavaFX 8: Introduction by Example

JavaFX 8: Introduction by Example shows you how to use your existing Java skills to create graphically exciting client applications with the JavaFX 8 platform. The book is a new and much improved edition of JavaFX 2.0: Introduction by Example, taking you through a series of engaging, fun-to-work examples that bring you up to...

Culture, Diversity and Heritage: Major Studies (SpringerBriefs on Pioneers in Science and Practice)
Culture, Diversity and Heritage: Major Studies (SpringerBriefs on Pioneers in Science and Practice)

The texts presented in this book trace the rise of culture as a major concern for development, international diplomacy, sustainability and national politics over the past two decades. As a major participant in anthropological field research, advocate for cultural freedom and decision-maker in international programs on culture, the author...

PowerShell in Depth
PowerShell in Depth

Summary

PowerShell in Depth, Second Edition is the go-to reference for administrators working with Windows PowerShell. Every major technique, technology, and tactic is carefully explained and demonstrated, providing a hands-on guide to almost everything an admin would do in the shell. Written by three...

Advances in the Homotopy Analysis Method
Advances in the Homotopy Analysis Method

Unlike other analytic techniques, the Homotopy Analysis Method (HAM) is independent of small/large physical parameters. Besides, it provides great freedom to choose equation type and solution expression of related linear high-order approximation equations. The HAM provides a simple way to guarantee the convergence of solution series. Such...

The Art of Product Design: Changing How Things Get Made
The Art of Product Design: Changing How Things Get Made

Embrace Open Engineering and accelerate the design and manufacturing processes

Product development is a team sport, but most companies don't practice it that way. Organizations should be drawing on the creativity of engaged customers and outsiders, but instead they rely on the same small group of internal...

Professional Microsoft SQL Server 2014 Integration Services (Wrox Programmer to Programmer)
Professional Microsoft SQL Server 2014 Integration Services (Wrox Programmer to Programmer)

Fill the gap between planning and doing with SSIS 2014

The 2014 release of Microsoft's SQL Server Integration Services provides enhancements for managing extraction, transformation, and load operations, plus expanded in-memory capabilities, improved disaster recovery, increased scalability, and much more. The increased...

C# Deconstructed: Discover how C# works on the .NET Framework
C# Deconstructed: Discover how C# works on the .NET Framework

C# Deconstructed answers a seemingly simply question: Just what is going on, exactly, when you run C# code on the .NET Framework?

To answer this question we will dig ever deeper into the structure of the C# language and the onion-skin abstraction layers of the .NET Framework that underpins it. We’ll follow the...
Troubleshooting Oracle Performance
Troubleshooting Oracle Performance

Troubleshooting Oracle Performance, 2nd Edition is your systematic guide to diagnosing and resolving performance problems in database-backed applications involving Oracle's database engine. Christian Antognini brings a decade and a half experience to his topic. His first edition is one of the most well-respected books in its...

The Illegal Business of Human Trafficking
The Illegal Business of Human Trafficking

This book offers a brand-new perspective on human trafficking as an illegal business. It also proposes a new form of networked action: combining the perspectives of academic researchers with those of highly skilled professionals involved in policymaking in this area, this book is a unique contribution and a first step toward a networking...

Execution IS the Strategy: How Leaders Achieve Maximum Results in Minimum Time
Execution IS the Strategy: How Leaders Achieve Maximum Results in Minimum Time
Turn Strategy into Performance!

In today’s world of rapid, disruptive change, strategy can’t be separate from execution—it has to emerge from execution. You have to continually adjust your strategy to fit new realities. But if your organization isn’t set up to be fast on its feet, you could
...
unlimited object storage image
Result Page: Previous 100 101 102 103 104 105 106 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy