This invaluable manual from world-renowned expert Johnny Saldana illuminates the process of qualitative coding and provides clear, insightful guidance for qualitative researchers at all levels.
This invaluable manual from world-renowned expert Johnny Saldana illuminates the process of qualitative coding and provides clear, insightful guidance for qualitative researchers at all levels.
From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today's collaborative culturesone that works without compromising sensitive company data or slowing business down.
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning (ML) and cloud computing combine to drive data-driven decision-making across industries.
Random Number Generators, Principles and Practices has been written for programmers, hardware engineers, and sophisticated hobbyists interested in understanding random numbers generators and gaining the tools necessary to work with random number generators with confidence and knowledge.
Random Number Generators, Principles and Practices has been written for programmers, hardware engineers, and sophisticated hobbyists interested in understanding random numbers generators and gaining the tools necessary to work with random number generators with confidence and knowledge.
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes.
Mastering Corda provides you with a consistent, linear, and paced path to learning Corda and building modern enterprise-grade decentralized applications.
Mastering Corda provides you with a consistent, linear, and paced path to learning Corda and building modern enterprise-grade decentralized applications.
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them.
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them.
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Googles BigTable data storage system.
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Googles BigTable data storage system.
If youre involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems.
If youre involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems.
Technologys influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products.
Technologys influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products.
In 1967 the University of Toronto School of Library Science held a two-day colloquium on the Anglo-American Cataloging Rules, the first public discussion of the new cataloguing code.