Testing Python is the most comprehensive book available on testing for one of the top software programming languages in the world. Python is a natural choice for new and experienced developers, and this hands-on resource is a much needed guide to enterprise-level testing development methodologies. The book will show you why Unit Testing and TDD can lead to cleaner, more flexible programs.
Unit Testing and Test-Driven Development (TDD) are increasingly must-have skills for software developers, no matter what language they work in. In enterprise settings, it's critical for developers to ensure they always have working code, and that's what makes testing methodologies so attractive. This book will teach you the most widely used testing strategies and will introduce to you to still others, covering performance testing, continuous testing, and more.
||Understanding LTE with MATLAB|
The LTE (Long Term Evolution) and LTE-Advanced are among the latest mobile communications standards, designed to realize the dream of a truly global, fast, all-IP-based, secure broadband mobile access technology.
This book examines the Physical Layer (PHY) of the LTE standards by incorporating three conceptual elements: an overview of the theory behind key enabling technologies; a concise discussion regarding standard specifications; and the MATLAB algorithms needed to simulate the standard.
The use of MATLAB, a widely used technical computing language, is one of the distinguishing features of this book. Through a series of MATLAB programs, the author explores each of the enabling technologies, pedagogically synthesizes an LTE PHY system model, and evaluates system performance at each stage. Following this step-by-step process, readers will achieve deeper understanding of LTE concepts and specifications through simulations.
||Big Data, Big Innovation|
Your business generates reams of data, but what do you do with it? Reporting is only the beginning. Your data holds the key to innovation and growth – you just need the proper analytics. In Big Data, Big Innovation: Enabling Competitive Differentiation Through Business Analytics, author Evan Stubbs explores the potential gold hiding in your un-mined data. As Chief Analytics Officer for SAS Australia/New Zealand, Stubbs brings an industry insider's perspective to guide you through pattern recognition, analysis, and implementation.
Big Data, Big Innovation details a groundbreaking approach to ensuring your company's upward trajectory. Use this guide to leverage your customer information, financial reports, performance metrics, and more to build a rock-solid foundation for future growth.
||Big Data, Data Mining, and Machine Learning|
Big data is big business. But having the data and the computational power to process it isn't nearly enough to produce meaningful results. Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners is a complete resource for technology and marketing executives looking to cut through the hype and produce real results that hit the bottom line. Providing an engaging, thorough overview of the current state of big data analytics and the growing trend toward high performance computing architectures, the book is a detail-driven look into how big data analytics can be leveraged to foster positive change and drive efficiency.
||A Practical Guide to Data Mining for Business and Industry|
Data mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create a versatile reference book, allowing readers to look for specific methods as well as for specific applications. The book is formatted to allow statisticians, computer scientists, and economists to cross-reference from a particular application or method to sectors of interest.
||Making Sense of Data I, 2nd Edition|
A proven go-to guide for data analysis, Making Sense of Data I: A Practical Guide to Exploratory Data Analysis and Data Mining, Second Edition focuses on basic data analysis approaches that are necessary to make timely and accurate decisions in a diverse range of projects. Based on the authors' practical experience in implementing data analysis and data mining, the new edition provides clear explanations that guide readers from almost every field of study.
In order to facilitate the needed steps when handling a data analysis or data mining project, a step-by-step approach aids professionals in carefully analyzing data and implementing results, leading to the development of smarter business decisions.
||Creating Business Agility|
Creating Business Agility provides a game plan for integrating technology to build a smarter, more customer-centric business. Using a series of case studies as examples throughout, the book describes the agility that comes from collaborative commerce, and provides key decision makers the implementation roadmap they need to build a successful business ecosystem. The focus is on Business Agility Readiness in terms of the five major changes affecting the information technology landscape, and how data-driven delivery platforms and decision-making processes are being reinvented using digital relationships with a social business model as the consumer world of technology drives innovation and collaboration.
||The Browser Hacker's Handbook|
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.
The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers.
||Android Hacker's Handbook|
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.
||Practical Reverse Engineering|
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.
||Cybersecurity for Executives|
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business.
Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures; Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management; Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information.