Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

July 09, 2015

eBook Description: Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and…

961 views
Threat Modeling

Threat Modeling

July 09, 2015

eBook Description: The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier’s Secrets…

833 views
Getting Started with Amazon Redshift

Getting Started with Amazon Redshift

July 09, 2015

Start by learning the fundamentals and then progress to creating and managing your own Redshift cluster. This guide walks you…

856 views
Mobile Marketing For Dummies

Mobile Marketing For Dummies

July 09, 2015

eBook Description: Straightforward advice on building and launching a mobile marketing plan Mobile communication is hot, and so is marketing…

722 views
Java Performance: The Definitive Guide

Java Performance: The Definitive Guide

July 09, 2015

Java Performance: The Definitive Guide Description: Coding and testing are often considered separate areas of expertise. In this comprehensive guide,…

2200 views
The Art of R Programming

The Art of R Programming

July 08, 2015

eBook Description: R is the world’s most popular language for developing statistical software: Archaeologists use it to track the spread…

1146 views
The New Community Rules

The New Community Rules

July 08, 2015

eBook Description: Blogs, networking sites, and other examples of the social web provide businesses with a largely untapped marketing channel…

689 views
Facebook Marketing For Dummies

Facebook Marketing For Dummies

July 08, 2015

eBook Description: Discover how to leverage the power of the Facebook community to achieve your business marketing goals Facebook boasts…

871 views
The Art of Rails

The Art of Rails

July 08, 2015

eBook Description: The Art of Rails : Any programmer knows that an API is only half the story, and with…

825 views