Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fire Protection Engineering Applications for Large Transportation Systems in China
Fire Protection Engineering Applications for Large Transportation Systems in China
The rapid development of China’s transportation system brings huge challenges to fire safety issues. Fire Protection Engineering Applications for Large Transportation Systems in Chinaanalyzes key fire issues for large transportation systems in rail, airport, tunnels, etc. and offers solutions and best practices for similar...
Atlas of Adolescent Dermatology
Atlas of Adolescent Dermatology

Valuable to dermatologists, adolescent medicine specialists, family medicine practitioners, and primary care physicians, the Atlas of Adolescent Dermatology presents a concise and practical guide to the diagnosis and management of adolescent skin diseases. Each chapter follows a similar format, to assist in ease of...

The Handbook of Banking Technology
The Handbook of Banking Technology
Competitive advantage in banking comes from effective use of technology

The Handbook of Banking Technology provides a blueprint for the future of banking, with deep insight into the technologies at the heart of the industry. The rapid evolution of IT brings continual change and demand for investment — yet...

The Dynamics of Peaceful and Violent Protests in Hong Kong: The Anti-extradition Movement
The Dynamics of Peaceful and Violent Protests in Hong Kong: The Anti-extradition Movement

This book shows that Hong Kong’s protests from June to December 2019 originated from not only an attempt to extradite a Hong Kong man involved in a Taiwan murder case, but also China’s effort at extraditing corrupt mainlanders who laundered dirty money in the territory. The mixture of peaceful and violent protests was due...

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Information Science and Applications: Proceedings of ICISA 2020 (Lecture Notes in Electrical Engineering, 739)
Information Science and Applications: Proceedings of ICISA 2020 (Lecture Notes in Electrical Engineering, 739)
This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology.  It explores how information science is core to most current research, industrial...
Quantum Computing for Everyone (The MIT Press)
Quantum Computing for Everyone (The MIT Press)

An accessible introduction to an exciting new area in computation, explaining such topics as qubits, entanglement, and quantum teleportation for the general reader.

Quantum computing is a beautiful fusion of quantum physics and computer science, incorporating some of the most stunning ideas from twentieth-century...

An Introduction to Mathematical Analysis
An Introduction to Mathematical Analysis
An elementary text on the theory of functions of one real variable this book is intended for students with a good understanding of calculus as it begins with material on the real number system as a Dedekind complete ordered field and continuous functions. Pointwise and uniform convergence of series of functions, power series are discussed...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Data Science and Digital Business
Data Science and Digital Business

This book combines the analytic principles of digital business and data science with business practice and big data. The interdisciplinary, contributed volume provides an interface between the main disciplines of engineering and technology and business administration. Written for managers, engineers and researchers who want to...

Machine Learning For Dummies
Machine Learning For Dummies
One of Mark Cuban’s top reads for better understanding A.I. (inc.com, 2021)

Your comprehensive entry-level guide to machine learning

While machine learning expertise doesn’t quite mean you can create your own Turing Test-proof android—as in the movie Ex Machina—it is a form of artificial...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy