Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth

Get your financial life in order. This comprehensive and objective guidebook will help you grow your net worth on a steady and increasing basis, regardless of your income level.

This new and expanded edition covers changes and strategies to maximize financial benefits and planning resulting from the recent tax legislation,
...
Hands-On Data Structures and Algorithms with Python: Write complex and powerful code using the latest features of Python 3.7, 2nd Edition
Hands-On Data Structures and Algorithms with Python: Write complex and powerful code using the latest features of Python 3.7, 2nd Edition

Learn to implement complex data structures and algorithms using Python

Key Features

  • Understand the analysis and design of fundamental Python data structures
  • Explore advanced Python concepts such as Big O notation and dynamic programming
  • Learn functional...
Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC
Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC

Use Windows PowerShell Desired State Configuration (DSC) to configure your infrastructure on-premises and in the cloud. In an environment where changes and deployments are happening all the time, DSC makes the necessary adjustments to the system so you don’t have to. Pro PowerShell Desired State Configuration shows...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Coding the Arduino: Building Fun Programs, Games, and Electronic Projects (Technology in Action)
Coding the Arduino: Building Fun Programs, Games, and Electronic Projects (Technology in Action)
Get started with Arduino and computer coding. This book is intended for those new to the Arduino and computer coding. and looking to gain the skills to write microcontroller programs that can act on given inputs and operate electromechanical output devices. 

Coding the Arduino contains four...
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.

Get more control of your applications performances in development and production and know how to meet your Service Level Agreement on critical microservices.

Key Features

  • Learn how to write a JavaEE application with performance constraints (Service Level Agreement?SLA) leveraging the...
Algebraic Models in Geometry (Oxford Graduate Texts in Mathematics)
Algebraic Models in Geometry (Oxford Graduate Texts in Mathematics)
Rational homotopy is a very powerful tool for differential topology and geometry. This text aims to provide graduates and researchers with the tools necessary for the use of rational homotopy in geometry. Algebraic Models in Geometry has been written for topologists who are drawn to geometrical problems amenable to topological methods and also...
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript

Increase your productivity by implementing complex data structures and algorithms using JavaScript

Key Features

  • A step by step guide, which will provide you with a thorough discussion on the analysis and design of fundamental JavaScript data structures
  • Get a better...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Python Data Structures and Algorithms: Improve application performance with graphs, stacks, and queues
Python Data Structures and Algorithms: Improve application performance with graphs, stacks, and queues

Implement classic and functional data structures and algorithms using Python

Key Features

  • A step by step guide, which will provide you with a thorough discussion on the analysis and design of fundamental Python data structures.
  • Get a better understanding of advanced Python...
Result Page: 38 37 36 35 34 33 32 31 30 29 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy