|
|
|
|
|
|
Intrusion Detection and PreventionIn today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,... | | Applied Cryptanalysis: Breaking Ciphers in the Real WorldThe book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... | | Learning Qlikview Data Visualization
Visualize and analyze data with the most intuitive business intelligence tool, QlikView
Overview
-
Explore the basics of data discovery with QlikView
-
Perform rank, trend, multivariate, distribution, correlation, geographical, and what-if analysis
-
Deploy data visualization best...
|
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |