Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Written by renowned data science experts Foster Provost and Tom Fawcett, Data Science for Business introduces the fundamental principles of data science, and walks you through the "e;data-analytic thinking"e; necessary for extracting useful knowledge and business value from the data you collect. This guide also helps you understand the many data-mining techniques in use today.Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. Youll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your companys data science projects. Youll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making.Understand how data science fits in your organizationand how you can use it for competitive advantageTreat data as a business asset that requires careful investment if youre to gain real valueApproach business problems data-analytically, using the data-mining process to gather good data in the most appropriate wayLearn general concepts for actually extracting knowledge from dataApply data science principles when interviewing data science job candidates
Increasingly, organisations rely on information for their day-to-day operations, and the loss or unavailability of information can mean the difference between success and ruin. Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It also includes a chapter on applying IRM in the public sector. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management.
A Modern Approach to Functional Programming Objects First with Java: A Practical Introduction is an introduction to object-oriented programming for beginners. The main focus of the book is general object-oriented and programming concepts from a software engineering perspective. The first chapters are written for students with no programming experience with later chapters being more suitable for advanced or professional programmers. The Java programming language and BlueJthe Java development environment are the two tools used throughout the book. BlueJ's clear visualization of classes and objects means that students can immediately appreciate the differences between them and gain a much better understanding of the nature of an object than they would from simply reading source code. Unlike traditional textbooks, the chapters are not ordered by language features but by software development concepts. The Sixth Edition goes beyond just adding the new language constructs of Java 8. The books exploration of this new language demonstrates a renaissance of functional ideas in modern programming. While functional programming isnt new in principle, its seen a boost in popularity based on the current computer hardware available and the changing nature of projects programmers wish to tackle. Functional language constructs make it possible to efficiently automate currency, make use of multiple cores without much effort on the side of the programmer, are both more elegant and readable, and offer great potential in solving the issue of parallel hardware. Functional programming has become an essential part of the field, and Objects First with Java gives students a basic understanding of an area theyll need to master in order to succeed in the future.
The Destiny Grimoire Anthology is a must-have collectible lore compendium assembled for Destiny's devoted and enlightened scholars and lore lovers, as well as fans of fantasy and sci-fi storytelling.
An inspiring collection of dark and macabre drawings and articles exploring the sketchbooks and artistic practices of 50 talented artists.
Don't be afraid of the GDPR wolf!How can your business easily comply with the new data protection and privacy laws and avoid fines of up to $27M? GDPR For Dummies sets out in simple steps how small business owners can comply with the complex General Data Protection Regulations (GDPR). These regulations apply to all businesses established in the EU and to businesses established outside of the EU insofar as they process personal data about people within the EU.Inside, you'll discover how GDPR applies to your business in the context of marketing, employment, providing your services, and using service providers. Learn how to avoid fines, regulatory investigations, customer complaints, and brand damage, while gaining a competitive advantage and increasing customer loyalty by putting privacy at the heart of your business.* Find out what constitutes personal data and special category data* Gain consent for online and offline marketing* Put your Privacy Policy in place* Report a data breach before being fined79% of U.S. businesses haven't figured out how they'll report breaches in a timely fashion, provide customers the right to be forgotten, conduct privacy impact assessments, and more. If you are one of those businesses that hasn't put a plan in place, then GDPR For Dummies is for you.
Agile Data Warehouse Design is a step-by-step guide for capturing data warehousing/business intelligence (DW/BI) requirements and turning them into high performance dimensional models in the most direct way: by modelstorming (data modeling + brainstorming) with BI stakeholders.This book describes BEAM¿, an agile approach to dimensional modeling, for improving communication between data warehouse designers, BI stakeholders and the whole DW/BI development team. BEAM¿ provides tools and techniques that will encourage DW/BI designers and developers to move away from their keyboards and entity relationship based tools and model interactively with their colleagues. The result is everyone thinks dimensionally from the outset! Developers understand how to efficiently implement dimensional modeling solutions. Business stakeholders feel ownership of the data warehouse they have created, and can already imagine how they will use it to answer their business questions. Within this book, you will learn:¿ Agile dimensional modeling using Business Event Analysis & Modeling (BEAM¿) ¿ Modelstorming: data modeling that is quicker, more inclusive, more productive, and frankly more fun!¿ Telling dimensional data stories using the 7Ws (who, what, when, where, how many, why and how)¿ Modeling by example not abstraction; using data story themes, not crow's feet, to describe detail¿ Storyboarding the data warehouse to discover conformed dimensions and plan iterative development¿ Visual modeling: sketching timelines, charts and grids to model complex process measurement - simply¿ Agile design documentation: enhancing star schemas with BEAM¿ dimensional shorthand notation¿ Solving difficult DW/BI performance and usability problems with proven dimensional design patternsLawrence Corr is a data warehouse designer and educator. As Principal of DecisionOne Consulting, he helps clients to review and simplify their data warehouse designs, and advises vendors on visual data modeling techniques. He regularly teaches agile dimensional modeling courses worldwide and has taught dimensional DW/BI skills to thousands of students.Jim Stagnitto is a data warehouse and master data management architect specializing in the healthcare, financial services, and information service industries. He is the founder of the data warehousing and data mining consulting firm Llumino.
Do you want to build web pages but have no prior experience? This friendly guide is the perfect place to start. You'll begin at square one, learning how the web and web pages work, and then steadily build from there.
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare-one in which a digital attack can have the same destructive capability as a megaton bomb. "Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit."-The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction-in this case, on an Iranian nuclear facility. In these pages, journalist Kim Zetter tells the whole story behind the world's first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran-and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making. But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.
Naughty Dog Studios and Dark Horse proudly present the essential companion to The Last of Us, a richly detailed and compelling game set in a postpandemic world where humans have become an endangered species. Featuring concept art, character designs, and astonishing settings and landscapes, The Art of The Last of Us provides a unique look at one of the gaming world's most eagerly anticipated titles. * A must-have companion to the game. * Incredible full-color artwork! * The latest project from Naughty Dog Studios. * The Last of Us swept the top Game Critics awards at 2012's E3 conference.
An insider's account of Big Tech's power grab--and what can be done to stop it Over the past decades, under the cover of "innovation," technology companies have successfully resisted regulation and have even begun to seize power from governments themselves. Facial recognition firms track citizens for police surveillance. Cryptocurrency has wiped out the personal savings of millions and threatens the stability of the global financial system. Spyware companies sell digital intelligence tools to anyone who can afford them. This new reality where unregulated technology has become a forceful instrument for autocrats around the world is terrible news for democracies and citizens. In The Tech Coup, Marietje Schaake offers a behind-the-scenes account of how technology companies crept into nearly every corner of our lives and our governments. She takes us beyond the headlines to high-stakes meetings with human rights defenders, business leaders, computer scientists, and politicians to show how technologies--from social media to artificial intelligence--have gone from being heralded as utopian to undermining the pillars of our democracies. To reverse this existential power imbalance, Schaake outlines game-changing solutions to empower elected officials and citizens alike. Democratic leaders can--and must--resist the influence of corporate lobbying and reinvent themselves as dynamic, flexible guardians of our digital world. Drawing on her experiences in the halls of the European Parliament and among Silicon Valley insiders, Schaake offers a frightening look at our modern tech-obsessed world--and offers a clear-eyed view of how democracies can build a better future before it is too late.
Prepare for Microsoft Exam MS-900 and help demonstrate your mastery of cloud services, the Software as a Service cloud model, and the options and benefits of Microsoft 365 cloud service offerings. Designed for IT professionals, Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certified Fundamentals level. Focus on the expertise measured by these objectives: Describe cloud concepts Describe Microsoft 365 apps and services Describe security, compliance, privacy, and trust in Microsoft 365 Describe Microsoft 365 pricing, licensing, and support This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are a business user, IT professional, or student interested in cloud computing and technologies, including individuals planning to pursue more advanced Microsoft 365 certification. About the ExamExam MS-900 focuses on using cloud services; different types of cloud services; core Microsoft 365components; comparisons between Microsoft 365 and on-premises services; modern management concepts; Microsoft 365 collaboration, mobility and analytics; Microsoft 365 security and compliance concepts; unified endpoint management; security usage scenarios and services; the Service Trust portal and Compliance Manager; Microsoft 365 licensing options; pricing; support; and service lifecycles. About Microsoft CertificationPassing this exam fulfills your requirements for the Microsoft 365 Certified Fundamentals certification credential, proving that you understand Microsoft 365 options, as well as the benefits of adopting cloud services, the Software as a Service (SaaS) cloud model, and Microsoft 365 cloud services in particular. See full details at: microsoft.com/learn
The Art of Assassin's Creed Origins collates hundreds of concept arts, including sketches, final paintings, and 3D Renders, alongside in-depth commentary from the artists and developers, representing the ultimate insight into the design processes behind the game.
"The visionary behind the bestselling phenomenon The Fourth Turning looks once again to America's past to predict our future in this startling and hopeful prophecy for how our present era of civil unrest will resolve over the next ten years--and what our lives will look like once it has"--
There are no easy decisions in software architecture. Instead, there are many hard parts--difficult problems or issues with no best practices--that force you to choose among various compromises. With this book, you'll learn how to think critically about the trade-offs involved with distributed architectures.Architecture veterans and practicing consultants Neal Ford, Mark Richards, Pramod Sadalage, and Zhamak Dehghani discuss strategies for choosing an appropriate architecture. By interweaving a story about a fictional group of technology professionals--the Sysops Squad--they examine everything from how to determine service granularity, manage workflows and orchestration, manage and decouple contracts, and manage distributed transactions to how to optimize operational characteristics, such as scalability, elasticity, and performance.By focusing on commonly asked questions, this book provides techniques to help you discover and weigh the trade-offs as you confront the issues you face as an architect.Analyze trade-offs and effectively document your decisionsMake better decisions regarding service granularityUnderstand the complexities of breaking apart monolithic applicationsManage and decouple contracts between servicesHandle data in a highly distributed architectureLearn patterns to manage workflow and transactions when breaking apart applications
A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies." And there is an entire industry of "black hat" hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys.In A Hacker's Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyse the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political and legal systems to their advantage, at the expense of everyone else.Once you learn how to notice hacks, you'll start seeing them everywhere-and you'll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you.Unchecked, these hacks threaten to upend our financial markets, weaken our democracy and even affect the way we think. And when artificial intelligence starts thinking like a hacker-at inhuman speed and scale-the results could be catastrophic.But for those who would don the "white hat," we can understand the hacking mindset and rebuild our economic, political and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks and realise a more equitable world.
This Epic Sticker Book contains over 200 awesome stickers and is packed full of your favourite Pokémon, from Pikachu to Charizard. Learn about each region's first partner Pokémon and their evolutions and test your training knowledge with challenging activities throughout the book.
THE NEW YORK TIMES BESTSELLER As seen on The Joe Rogan Experience!A groundbreaking dive into the role psychedelics have played in the origins of Western civilization, and a real-life quest for the Holy Grail.The most influential religious historian of the twentieth century, Huston Smith, once referred to it as the "best-kept secret" in history. Did the Ancient Greeks use drugs to find God? And did the earliest Christians inherit the same, secret tradition? A profound knowledge of visionary plants, herbs and fungi passed from one generation to the next, ever since the Stone Age?There is zero archaeological evidence for the original Eucharist - the sacred wine said to guarantee life after death for those who drink the blood of Jesus. The Holy Grail and its miraculous contents have never been found. In the absence of any hard data, whatever happened at the Last Supper remains an article of faith for today's 2.5 billion Christians. In an unprecedented search for real answers, The Immortality Key examines the archaic roots of the ritual that is performed every Sunday for nearly one third of the planet. Religion and science converge to paint a radical picture of Christianity's founding event...and, after centuries of debate, to solve history's greatest puzzle once and for all.Before the birth of Jesus, the Ancient Greeks found salvation in their own sacraments. Sacred beverages were routinely consumed as part of the so-called Ancient Mysteries - elaborate rites that led initiates to the brink of death. The best and brightest from Athens and Rome flocked to the spiritual capital of Eleusis, where a holy beer unleashed heavenly visions for two thousand years. Others drank the holy wine of Dionysus to become one with the god. In the 1970s, renegade scholars claimed this beer and wine - the original sacraments of Western civilization - were spiked with mind-altering drugs. In recent years, vindication for the disgraced theory has been quietly mounting in the laboratory. The constantly advancing fields of archaeobotany and archaeochemistry have hinted at the enduring use of hallucinogenic drinks in antiquity. And with a single dose of psilocybin, the psychopharmacologists at Johns Hopkins and NYU are now turning self-proclaimed atheists into instant believers. But the smoking gun remains elusive.If these sacraments survived for thousands of years in our remote prehistory, from the Stone Age to the Ancient Greeks, did they also survive into the age of Jesus? Was the Eucharist of the earliest Christians, in fact, a psychedelic Eucharist?With an unquenchable thirst for evidence, Brian C. Muraresku takes the reader on his twelve-year global hunt for proof. He tours the ruins of Greece with its government archaeologists. He gains access to the hidden collections of the Louvre Museum to show the continuity from pagan to Christian wine. He unravels the Ancient Greek of the New Testament with a Catholic priest. He spelunks into the catacombs under the streets of Rome to decipher the lost symbols of Christianity's oldest monuments. He breaches the secret archives of the Vatican to unearth manuscripts never before translated into English. And with leads from the archaeological chemists at the University of Pennsylvania and the Massachusetts Institute of Technology, he unveils the first scientific data for the ritual use of psychedelic drugs in classical antiquity.The Immortality Key reconstructs the suppressed history of women consecrating a forbidden, drugged Eucharist that was later banned by the Church Fathers. Women who were then targeted as witches during the Inquisition, when Europe's sacred pharmacology largely disappeared. Have the scientists of today resurrected this lost technology? Is Christianity capable of returning to its roots?Featuring a Foreword by Graham Hancock, the New York Times bestselling author of America Before: The Key to Earth's Lost Civilization.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.