Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Provides techniques for the development of safe and secure embedded software. This title covers a study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems.
Demystifies the concept, technology and application of analytics and breaks its implementation down to repeatable and manageable steps, making it possible for widespread adoption across all functions of an organization. This title provides an approach to identify opportunities, extract requirements, design variables and build and test models.
Presents an examination of the critical but commonly overlooked checklist method. This book includes a chapter that discusses being mindful of the choice of words, order of questions and how early questions influence later questions, answer scales and how they impact the user response, questionnaire design, and more.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.