Home | Amazing | Today | Tags | Publishers | Years | Search 
Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners (Wiley and SAS Business Series)
Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners (Wiley and SAS Business Series)

With big data analytics comes big insights intoprofitability

Big data is big business. But having the data and thecomputational power to process it isn't nearly enough to producemeaningful results. Big Data, Data Mining, and Machine Learning:Value Creation for Business Leaders and Practitioners is acomplete...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing

Fundamental testing methodologies applied to the popular Pythonlanguage

Testing Python; Applying Unit Testing, TDD, BDD andAcceptance Testing is the most comprehensive book available ontesting for one of the top software programming languages in theworld. Python is a natural choice for new and experienceddevelopers,...

An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications

Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe. The book assumes no more than a...

Data Structures and Algorithms in Java
Data Structures and Algorithms in Java

The design and analysis of efficient data structures has long been recognized as a key component of the Computer Science curriculum. Goodrich, Tomassia and Goldwasser's approach to this classic topic is based on the object-oriented paradigm as the framework of choice for the design of data structures. For each ADT presented in the text,...

Derivatives Analytics with Python: Data Analysis, Models, Simulation, Calibration and Hedging (The Wiley Finance Series)
Derivatives Analytics with Python: Data Analysis, Models, Simulation, Calibration and Hedging (The Wiley Finance Series)

Supercharge options analytics and hedging using the power ofPython

Derivatives Analytics with Python shows you how toimplement market-consistent valuation and hedging approaches usingadvanced financial models, efficient numerical techniques, and thepowerful capabilities of the Python programming language. Thisunique...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
INNOVATION, CULTURE, AND BIG DATA ANALYTICS
 
Ignoring the big data hype and diving right into the value proposition, Big Data, Big Innovation takes a long, hard look at making sure that businesses don't stray off course when chasing innovation. It focuses on real-world goals, strategies...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

A Practical Guide to Data Mining for Business and Industry
A Practical Guide to Data Mining for Business and Industry

Data mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create...

Lean Auditing: Driving Added Value and Efficiency in Internal Audit
Lean Auditing: Driving Added Value and Efficiency in Internal Audit

"How can you argue with the core principles of Lean, that you focuson what provides value to your customer and eliminate work that isnot necessary (muda)? Internal auditors need to understandnot  only who their primary customers are, but what isvaluable to them - which in most cases is assurance that the risksthat matter to the...

Program Management for Improved Business Results
Program Management for Improved Business Results

Superior program management begins with superior information and strategy

Program Management for Improved Business Results, Second Edition is a practical guide to real-world program management, written to align with the rigorous PMI® PgMP® certification standards. The book explains the benchmarks and best...

Result Page: 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy