Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
The book constitutes the refereed proceedings of the 13th EAI International Conference on Communications and Networking, held in October 2018 in Chengdu, China. The 71 papers presented were carefully selected from 114 submissions. The papers are organized in topical sections on wireless communications and networking, next...
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL

Over 66 hands-on recipes that cover UI development, animations, component architecture, routing, databases, testing, and debugging with React

Key Features

  • Use essential hacks and simple techniques to solve React application development challenges
  • Create native mobile...
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career

The role of the business analyst sits at the intersection of business operations, technology, and change management. The job requires a plethora of both soft skills and technical skills, as it must translate the needs of business users into action items for functional applications. On top of this, in-demand technologies...

Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition
Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition

Unleash the power of VMware vSphere 6.7 to develop a powerful, flexible, and secure digital infrastructure

Key Features

  • Explore management, security, scalability, and availability with vSphere 6.7
  • Design, deploy, and manage VMware vSphere virtual datacenters
  • ...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Building Your Online Store With WordPress and WooCommerce: Learn to Leverage the Critical Role E-commerce Plays in Today’s Competitive Marketplace
Building Your Online Store With WordPress and WooCommerce: Learn to Leverage the Critical Role E-commerce Plays in Today’s Competitive Marketplace

Teaches you all about e-commerce and how to create your own online shop using WordPress and WooCommerce. Regardless of a business’s size, e-commerce helps level the playing field, increases a business’s exposure, allows companies to reach customers globally, and streamlines the fulfillment process. In the past, e-commerce...

Birth of the Binge: Serial TV and the End of Leisure (Contemporary Approaches to Film and Media Series)
Birth of the Binge: Serial TV and the End of Leisure (Contemporary Approaches to Film and Media Series)

Birth of the Binge: Serial TV and the End of Leisure describes and details serial television and "binge watching," the exceedingly popular form of contemporary television viewing that has come to dominance over the past decade. Author Dennis Broe looks at this practice of media consumption by suggesting that...

Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Hands-On Enterprise Java Microservices with Eclipse MicroProfile: Build and optimize your microservice architecture with Java
Hands-On Enterprise Java Microservices with Eclipse MicroProfile: Build and optimize your microservice architecture with Java

An effective guide to designing, building, and deploying enterprise Java microservices with Eclipse MicroProfile

Key Features

  • Create cloud-native microservices with ease using this detailed guide
  • Avoid vendor lock-in when implementing microservices using Eclipse...
Thriving in the Gig Economy: Freelancing Online for Tech Professionals and Entrepreneurs
Thriving in the Gig Economy: Freelancing Online for Tech Professionals and Entrepreneurs

Take an in-depth look into the gig economy to see how tech professionals and entrepreneurs can earn a living as freelancers and contractors. Build your own business. The pros and cons of the lifestyle and what to expect from it are discussed.

In this book, author Adam Sinicki explains the impact of the gig economy and...

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Result Page: 273 272 271 270 269 268 267 266 265 264 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy