Eleventh Hour CISSP

Eleventh Hour CISSP

Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to

Detail BookEleventh Hour CISSP

The Pentester BluePrint

The Pentester BluePrint

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip

Detail BookThe Pentester BluePrint

Mathematical Methods in Data Science

Mathematical Methods in Data Science

Mathematical Methods in Data Science covers a broad range of mathematical tools used in data science, including calculus, linear algebra, optimization, network analysis, probability and differential equations. Based on the authors’ recently published and previously unpublished results, this book introduces

Detail BookMathematical Methods in Data Science

Dublin 1847

Dublin 1847

Forty-five map extracts and commentaries detailing the features and areas of mid nineteenth-century Dublin. It is an ancillary publication to IHTA, no. 26, Dublin, part III, 1756 to 1847 by Rob Goodbody.

Detail BookDublin 1847