Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes is a recent platform, based on more than ten years of experience in cloud computing by big companies like Google, its creator. It is considered complex as it includes all the concepts to run diverse applications in a large variety of environments.

This book, based on the curricula of the two Kubernetes
...
PowerShell in Depth: An administrator's guide
PowerShell in Depth: An administrator's guide

Summary

PowerShell in Depth is the kind of book you'll want open on your desk most of the time. With 40 short chapters, each focused on a specific area of PowerShell, you'll be able to find the answers you need quickly. Each chapter is concise and to-the-point, so you can spend less time reading and...

Oracle 12c: SQL
Oracle 12c: SQL

Now you can master the latest version of the fundamental SQL language used in all relational databases today with ORACLE 12C: SQL, 3E. Much more than a study guide, this edition helps you transform a basic knowledge of databases into proficiency with the latest SQL and Oracle concepts and techniques. You learn to use Oracle 12c SQL most...

Learning Shell Scripting with Zsh
Learning Shell Scripting with Zsh

Your one-stop guide to reading, writing, and debugging simple and complex Z shell scripts

Overview

  • A step-by-step guide that will show you how to use Zsh and its repertoire of powerful features to improve the efficiency of your daily tasks
  • Learn how to configure and use Zsh
  • ...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)
CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)
This book is intended to provide an introduction to the exciting and emerging world of wireless LAN technology. This technology continues to expand at a phenomenal pace with constant improvements in speed, reliability, and security. Reading this book will teach you the fundamentals of standards-based technology, giving you an overview of the...
tmux: Productive Mouse-Free Development
tmux: Productive Mouse-Free Development

Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. Learn how to customize, script, and leverage tmux's unique abilities and keep your fingers on...

The Linux Philosophy for SysAdmins: And Everyone Who Wants To Be One
The Linux Philosophy for SysAdmins: And Everyone Who Wants To Be One

Reveals and illustrates the awesome power and flexibility of the command line, and the design and usage philosophies that support those traits. This understanding of how to extract the most from the Linux command line can help you become a better SysAdmin. Understand why many things in the Linux and Unix worlds are done as...

RMAN Recipes for Oracle Database 12c: A Problem-Solution Approach (Expert's Voice in Oracle)
RMAN Recipes for Oracle Database 12c: A Problem-Solution Approach (Expert's Voice in Oracle)

RMAN Recipes for Oracle Database 12c is an example-driven approach to the Oracle database administrator's #1 job responsibility: 

  • Be able to recover the database.

Of all the things you are responsible for as database administrator, nothing is more important than the data itself. Like it...

Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database
Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database

Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

unlimited object storage image
Result Page: 79 78 77 76 75 74 73 72 71 70 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy