Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
Professional Access 2013 Programming
Professional Access 2013 Programming

Authoritative and comprehensive coverage for building Access 2013 Solutions

Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book...

Ubuntu Unleashed 2008 Edition: Covering 8.04 and 8.10 (4th Edition)
Ubuntu Unleashed 2008 Edition: Covering 8.04 and 8.10 (4th Edition)
Ubuntu Unleashed 2008 Edition presents comprehensive coverage of the popular Ubuntu Linux distribution. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly, easy-to-use Linux distribution.

This book provides detailed information on installing, using, and administering Ubuntu....

Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive...
Practical DataOps: Delivering Agile Data Science at Scale
Practical DataOps: Delivering Agile Data Science at Scale
Gain a practical introduction to DataOps, a new discipline for delivering data science at scale inspired by practices at companies such as Facebook, Uber, LinkedIn, Twitter, and eBay. Organizations need more than the latest AI algorithms, hottest tools, and best people to turn data into insight-driven action and useful...
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

Deploying Qos for Cisco Ip and Next Generation Networks: The Definitive Guide
Deploying Qos for Cisco Ip and Next Generation Networks: The Definitive Guide
"Deploying QoS for IP Next Generation Networks: The Definitive Guide" provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference for businesses that plan to deploy a QoS framework for voice, video, mobility and data...
Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and JavaScript
Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and JavaScript

By taking you through the development of a real web application from beginning to end, the second edition of this hands-on guide demonstrates the practical advantages of test-driven development (TDD) with Python. You’ll learn how to write and run tests before building each part of your app, and then develop the minimum...

Windows Server 2008 Inside Out
Windows Server 2008 Inside Out
Learn how to conquer Windows Server 2008 from the inside out! Designed for system administrators, this definitive resource features hundreds of timesaving solutions, expert insights, troubleshooting tips, and workarounds for administering Windows Server 2008 all in concise, fast-answer format. You will learn how to perform upgrades and migrations,...
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
It can be tough to roll out a pre-configured environment if you don't know what you're doing. We'll show you how to streamline your service options with Docker, so that you can scale in an agile and responsive manner.
Key Features
  • Learn how to structure your own Docker containers
  • ...
Microsoft Windows Server 2003 Deployment Kit: A Microsoft Resource Kit
Microsoft Windows Server 2003 Deployment Kit: A Microsoft Resource Kit

This volume delivers in-depth deployment planning information for automated installations, multilingual deployments, and compatibility testing along with design information for unattended installations, image-based installations, and (RIS) installations.

Plan, design, and implement automated and customized...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy