Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the...

Prezi Hotshot
Prezi Hotshot

Create amazing Prezi presentations through 10 exciting Prezi projects

About This Book

  • Amaze your audience and keep them engaged during your presentations with Prezi
  • Create interactive presentations from scratch by adding images, animations, and more
  • Learn Prezi through ten...
Implementing Citrix XenServer Quickstarter
Implementing Citrix XenServer Quickstarter

To get a flying start on virtualization technology, you can't do better than this hands-on, let's-keep-it-simple guide to implementing Citrix XenServer. From installation basics to advanced features, it's all here in pictures and plain English.

Overview

  • A simple and quick start guide for any...
Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization)
Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization)

Markov networks and other probabilistic graphical modes have recently received an upsurge in attention from Evolutionary computation community, particularly in the area of Estimation of distribution algorithms (EDAs).  EDAs have arisen as one of the most successful experiences in the application of machine learning methods in...

Getting Better at Private Practice
Getting Better at Private Practice

Expert advice for building your private practice

The "business" of practice as a mental health professional is a skill that is seldom taught in school and requires thoughtful guidance and professional mentorship from those who have already succeeded.

Containing the collective wisdom and secrets of many...

Clojure Web Development Essentials
Clojure Web Development Essentials

Develop your own web application with the effective use of the Clojure programming language

About This Book

  • Use Clojure to create robust, ready-to-be deployed web applications
  • Get to grips with Clojure through successive implementation of applications using new features
  • ...
Twilio Cookbook
Twilio Cookbook

The Twilio cookbook will enable all kinds of telephone usage, including SMS, on your websites. It’s a totally practical guide with a hands-on approach to help you dig deep into the enormous potential of telephone facilities on the Web.

Overview

  • Teaches software developers to programmatically make...
Python Programming for Arduino
Python Programming for Arduino

Develop practical Internet of Things prototypes and applications with Arduino and Python

About This Book

  • Transform your hardware ideas into real-world applications using Arduino and Python
  • Design and develop hardware prototypes, interactive user interfaces, and cloud-connected...
Contemporary High Performance Computing: From Petascale toward Exascale
Contemporary High Performance Computing: From Petascale toward Exascale

Contemporary High Performance Computing: From Petascale toward Exascale focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors.

...
The Art of Paper Cutting
The Art of Paper Cutting

Papercutting is an ancient, elegant art that dates almost as far back as the creation of paper itself. In today’s multicultural world, papercutting embraces any...

Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware...

Crisis Management and Emergency Planning: Preparing for Today's Challenges
Crisis Management and Emergency Planning: Preparing for Today's Challenges

Emergency managers and officials have seen a tremendous increase in the planning responsibilities placed on their shoulders over the last decade. Crisis Management and Emergency Planning: Preparing for Today's Challenges supplies time-tested insights to help communities and organizations become better prepared to cope...

Result Page: Previous 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy