 |
|
|
|
 Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically... |  |  HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery (7th Edition)
Thoroughly revised and updated with examples rewritten to conform to HTML5, CSS3, and contemporary web development practices, this easy-to-understand, step-by-step tutorial helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics, video, and interactivity with ... |  |  Data Wrangling with Python: Tips and Tools to Make Your Life Easier
How do you take your data analysis skills beyond Excel to the next level? By learning just enough Python to get stuff done. This hands-on guide shows non-programmers like you how to process information that’s initially too messy or difficult to access. You don't need to know a thing about the Python programming language to... |
|
 A Guide to Eighteenth-Century Art
A Guide to Eighteenth-Century Art offers an introductory overview of the art, artists, and artistic movements of this exuberant period in European art, and the social, economic, philosophical, and political debates that helped shape them.
-
Covers both artistic developments and critical approaches to the period...
|  |  Absolute Beginners Guide to Computing
Learn and understand how you can perform a wide range of tasks on your new Windows computer, including managing files, browsing the internet, and protecting yourself, as well as interacting with Cortana.
Using Absolute Beginners Guide to Computing you will see how to use Windows, and how you can connect and... |  |  |
|
 NTP Security: A Quick-Start Guide
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.
NTP Security: A Quick-Start... |  |  PHP Beyond the Web
Use your existing web-based PHP skills to write all types of software: CLI scripts, desktop software, network servers, and more. This book gives you the tools, techniques, and background necessary to write just about any type of software you can think of, using the PHP you know.
PHP Beyond the Web... |  |  Learning Analytics in R with SNA, LSA, and MPIA
This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.
... |
|
 iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure.
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to ... |  |  Learn Linux in a Month of Lunches
Summary
Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate... |  |  |
|
|
Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next |