You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
While Excel remains ubiquitous in the business world, recent Microsoft feedback forums are full of requests to include Python as an Excel scripting language. In fact, it's the top feature requested. What makes this combination so compelling? In this hands-on guide, Felix Zumstein--creator of xlwings, a popular open source package for automating Excel with Python--shows experienced Excel users how to integrate these two worlds efficiently. Excel has added quite a few new capabilities over the past couple of years, but its automation language, VBA, stopped evolving a long time ago. Many Excel power users have already adopted Python for daily automation tasks. This guide gets you started. Use P...
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed de...
The secrets to Apple's success and how to use them, from the Apple insider Ken Segall In Think Simple, Apple insider and New York Times bestselling author Ken Segall gives you the tools to Apple's success - and shows you how to use them. It's all about simplicity. Whether you're in a multinational corporation or a lean startup, this guide will teach you how to crush complexity and focus on what matters; how to perform better, faster and more efficiently. Combining his insight from Apple with examples from companies across industries all over the world - including Ben & Jerry's, Whole Foods, Intel and HyundaiCard - Segall provides a simple roadmap for any company to find success.
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.
This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes current trends in malware activity online, including botnets and malicious code for profit, and it proposes effective models for detection and prevention of attacks using. Furthermore, the book introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.
The internet is so central to everyday life, that it is impossible to contemplate life without it. From finding romance, to conducting business, receiving health advice, shopping, banking, and gaming, the internet opens up a world of possibilities to people across the globe. Yet for all its positive attributes, it is also an environment where we witness the very worst of human behaviour - cybercrime, election interference, fake news, and trolling being just a few examples. What is it about this unique environment that can make people behave in ways they wouldn't contemplate in real life. Understanding the psychological processes underlying and influencing the thinking, interpretation and beh...
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software de...
SELF-MADE IS A TRULY DEFINITIVE GUIDE; A 'GO-TO' BOOK FOR ALL ENTREPRENEURS AT ANY STAGE OF BUSINESS. This authoritative, focused guide by two of the UK's brightest young entrepreneurs - The Apprentice runner-up, Bianca Miller and serial entrepreneur, Byron Cole - is a comprehensive toolkit for anyone who wants to make a success of running their own business. Featuring interviews with well known entrepreneurs, entertainers and industry experts, the book covers every tier of the business development process, from start-up to exit, offering practical, implementable and global advice on the start up process. De-coding the jargon that is prevalent in business circles today, this book provides straightforward advice on converting an innovative business concept into a commercially viable proposition. It will help you to avoid the costly common mistakes of many who have gone before you, and create a sustainable enterprise that will flourish. Read Self Made and run your own business without fear of failure.
With his long-running 'Everyday Economics' column in Slate and his popular book, The Armchair Economist, Steven Landsburg has been leading the pack of economists who are transforming their science from a drab meditation on graphs and charts into a fascinating window on human nature. Now he's back and more provocative than ever with surprises on virtually every page. In More Sex is Safer Sex, Professor Landsburg offers readers a series of stimulating discussions that all flow from one unsettling fact. Combining the rational decisions of each of us often produces an irrational result for all of us. Avoiding casual sex can actually encourage the spread of diseases. To solve population pressures, we need more people. In his tantalizing, entertaining narrative, Landsburg guides us through these shocking notions by the light of compelling logic and evidence and makes suggestions along the way: Why not charge juries if a convicted felon is exonerated? Why not let firemen keep the property they rescue? As entertaining as it is inflammatory, More Sex is Safer Sexwill make readers think about their decisions in unforgettable ways -- and spark debate over much that we all take for granted.
A premiada repórter de segurança cibernética do New York Times revela os bastidores do obscuro mercado internacional de armas digitais. A partir de sete anos de entrevistas com centenas de hackers, ativistas, dissidentes, acadêmicos, cientistas da computação, funcionários de governos, peritos e mercenários, Nicole Perlroth relata a expansão descontrolada de uma indústria clandestina que negocia zero-days, falhas de software ou hardware que permitem o acesso de invasores. A autora detalha episódios como a onda de ataques digitais russos à Ucrânia e alerta para a iminência de guerras cibernéticas a nível global, que ameaçam não apenas a privacidade individual, mas também o funcionamento de estruturas e serviços essenciais conectados à internet - governos, empresas, hospitais, escolas, transporte e abastecimento de energia. Em uma narrativa com ritmo de thriller, Nicole Perlroth joga luz sobre um mercado altamente secreto e convoca os leitores a pensar e discutir a questão, antes que seja tarde demais.