Electronic Books

Total Books: 61 - 79 /79
NoIMG
Quality Measures in Data Mining

This volume presents the state of the art concerning quality and interestingness measures for data mining. The book summarizes ...

Lee mas
Reforms, Organizational Change and Performance in Higher Education

This book investigates the effects of changes in leadership and managerial structures of Nordic universities resulting from ...

Lee mas
Research Ethics for Students in the Social Sciences

This textbook offers a practical guide into research ethics for undergraduate students in the social sciences. A step-by-step ...

Lee mas
Safety for Particle Accelerators

The use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...

Lee mas
Security-first compliance for small businesses / Karen M. Walsh

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...

Lee mas
Sinkholes and Subsidence

"Sinkholes and Subsidence" provides a twenty-first century account of how the various subsidence features in carbonate ...

Lee mas
NoIMG
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication

From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...

Lee mas
Student Feedback on Teaching in Schools Using Student Perceptions for the Development of Teaching and Teachers

This book provides a comprehensive and informative overview of the current state of research about student perceptions of ...

Lee mas
The Art of Attack: Attacker Mindset for Security Professionals / Maxie Reynolds

Untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...

Lee mas
The Brownian Motion : A Rigorous but Gentle Introduction for Economists

This textbook is the first to provide Business and Economics with a precise and intuitive introduction to the formal backgrounds ...

Lee mas
The Construction Industry: Global Trends, Job Burnout and Safety Issues / Emmanuel Adinyira, Kofi Agyekum

The call for transformation in critical aspects of the operations of the global construction industry is ever more critical.

Lee mas
NoIMG
The determinants of conventional Syrian banks profitability زينب رزوق ؛ مروة مرعي ؛ ليندا قاسم ؛ إشراف د. علاء صالحاني

The primary objective of this study is to examine the impact of bank specific characteristics and macroeconomic variables ...

Lee mas
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

Lee mas
Tools and Criteria for Sustainable Coastal Ecosystem Management : Examples from the Baltic Sea and Other Aquatic Systems

The aim of this book is to discuss practically useful (operational) bioindicators for sustainable coastal management, criteria ...

Lee mas
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

Lee mas
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

Lee mas
NoIMG
Wadi Flash Floods : Challenges and Advanced Approaches for Disaster Risk Reduction

The book chapters comprehensively and significantly highlight different scientific research disciplines related to wadi flash ...

Lee mas
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise / Jennifer Minella, Stephen Orr

Offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...

Lee mas
Wireless and Mobile Device Security ; 2nd ed. / Jim Doherty

Provides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...

Lee mas
Total Books: 61 - 79 /79