Big Data

Big Data

There is so much buzz around big data. We all need to know what it is and how it works...

Hacking the Hacker

Hacking the Hacker

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and...

Analog Electronics for Measuring Systems

Analog Electronics for Measuring Systems

Many instrumentation engineers and scientists often deal with analog electronic issues when approaching delicate measurements. Even if off-the-shelf measuring solutions...

The Cyber Risk Handbook

The Cyber Risk Handbook

Actionable guidance and expert perspective for real-world cybersecurityThe Cyber Risk Handbook is the practitioner’s guide to implementing, measuring and improving...

Data-Driven Security

Data-Driven Security

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and...

Derivatives Analytics with Python

Derivatives Analytics with Python

Derivatives Analytics with Python shows you how to implement market-consistent valuation and hedging approaches using advanced financial models, efficient numerical...

Cybersecurity for Executives

Cybersecurity for Executives

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business...

Formal Methods

Formal Methods

Although formal analysis programming techniques may be quite old, the introduction of formal methods only dates from the 1980s. These...

Windows 10 Anniversary Update Bible

Windows 10 Anniversary Update Bible

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup...

Architectures for Computer Vision

Architectures for Computer Vision

This book provides comprehensive coverage of 3D vision systems, from vision models and state-of-the-art algorithms to their hardware architectures for...