Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Reproducible Research with R and R Studio (Chapman & Hall/CRC The R Series)
Reproducible Research with R and R Studio (Chapman & Hall/CRC The R Series)

Bringing together computational research tools in one accessible source, Reproducible Research with R and RStudio guides you in creating dynamic and highly reproducible research. Suitable for researchers in any quantitative empirical discipline, it presents practical tools for data collection, data analysis, and the...

Creating Belonging in San Francisco Chinatown’s Diasporic Community: Morphosyntactic Aspects of Indexing Ethnic Identity
Creating Belonging in San Francisco Chinatown’s Diasporic Community: Morphosyntactic Aspects of Indexing Ethnic Identity

This book presents a much-needed discussion on ethnic identification and morphosyntactic variation in San Francisco Chinatown?a community that has received very little attention in linguistic research. An investigation of original, interactive speech data sheds light on how first- and second-generation Chinese Americans...

Performance Tuning for Linux(R) Servers
Performance Tuning for Linux(R) Servers
Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise ServerAn indispensable guide to maximizing Linux system and application performanceFrom Wall...
PHP Developer's Cookbook (2nd Edition)
PHP Developer's Cookbook (2nd Edition)

PHP is an open source, server-side, HTML-embedded scripting language used to create dynamically generated Web pages. With an easy-to-use syntax and a large, extensible library of modules, PHP makes it fast and easy to create powerful data-driven Web sites for e-commerce, community portals, and other Web-based applications.

...
Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Practical Industrial Data Networks: Design, Installation and Troubleshooting (IDC Technology)
Practical Industrial Data Networks: Design, Installation and Troubleshooting (IDC Technology)
This is a comprehensive book covering the essentials of troubleshooting and problem solving of
industrial data communications systems including areas such as RS-232, RS-485, industrial protocols
such as Modbus, fiber optics, industrial Ethernet, TCP/IP, DeviceNet and Fieldbus protocols such as
Profibus and Foundation Fieldbus. It can
...
Pivot Table Data Crunching (Business Solutions)
Pivot Table Data Crunching (Business Solutions)
Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author ...
Programming Spiders, Bots, and Aggregators in Java
Programming Spiders, Bots, and Aggregators in Java
The content and services available on the web continue to be accessed mostly through direct human control. But this is changing. Increasingly, users rely on automated agents that save them time and effort by programmatically retrieving content, performing complex interactions, and aggregating data from diverse sources. Programming Spiders,...
Building a Cisco Network for WIndows 2000
Building a Cisco Network for WIndows 2000
The release of Windows 2000 Server represents a major advance in the integration of Microsoft's and Cisco's network technologies. Windows 2000 provides an LDAP-compliant directory service called Active Directory. It is accessible over any TCP/IP based internetwork, including the Internet. As such, the Active Directory is the foundation of this...
Beginning Database Design (Wrox Beginning Guides)
Beginning Database Design (Wrox Beginning Guides)
Database design involves how to best structure the tables and queries that are used with databases in order to provide optimum performance, storage, manageability, and flexibility. With relational databases, you can use those tables to organize your data and retrieve information from your database. This book provides you with an easy-to-understand...
unlimited object storage image
Result Page: 717 716 715 714 713 712 711 710 709 708 707 706 705 704 703 702 701 700 699 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy