Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
The average blogger does not typically have experience with design or coding, but that shouldn't deter them from having a professional-looking blog design. This friendly and easy-to-understand guide provides you with the tools you need to establish a creative, unique, and aesthetically memorable blog without having to learn how to code...
Nominal sets provide a promising new mathematical analysis of names in formal languages based upon symmetry, with many applications to the syntax and semantics of programming language constructs that involve binding, or localising names. Part I provides an introduction to the basic theory of nominal sets. In Part II, the author surveys some of...
Bringing together computational research tools in one accessible source, Reproducible Research with R and RStudio guides you in creating dynamic and highly reproducible research. Suitable for researchers in any quantitative empirical discipline, it presents practical tools for data collection, data analysis, and the...
Implementing a financial plan to manage the future is very important. If you have not assembled such a plan, or even if you have not thought about how best to manage your financial future, the time to do so is now, and the resource you need to walk you through every step of the personal financial planning process is Plan Your Financial...
More than half of all businesses in the U.S. don’t make it to their fifth birthday, and nearly 70 percent are gone by year ten. How do businesses get into trouble? A hundred different ways. Poor cash flow, undercapitalization, lax financial controls, poor worker productivity, boneheaded mistakes, inefficient processes, failure to adapt,...
Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...
Real World Windows 8 App Development with JavaScript offers you practical advice and hard-earned insights that will help you create and publish apps to a worldwide market.
Led by authors with deep Windows 8 app development experience, you’ll learn how to make the most of Microsoft’s APIs for hooking into...
Pro Oracle Database 12c Administration is a book focused on results. Author Darl Kuhn draws from a well of experience over a decade deep to lay out real-world techniques that lead to success as an Oracle Database administrator. He gives clear explanations on how to perform critical tasks. He weaves in theory where necessary without...
Sieht man genau hin, lassen sich große Unterschiede zwischen der deutschen und der amerikanischen Gesellschaft ausmachen. Viele davon sind unter der Oberfläche verborgen. Max Webers historisch-vergleichende Soziologie ist für eine kausale Erklärung dieser Unterschiede bestens gerüstet. Max Weber interessierte...