Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
Pro SQL Server Disaster Recovery
Pro SQL Server Disaster Recovery
Many would argue that the single, most important job of a SQL Server database administrator is to be able to recover your database in the event of loss or damage. Pro SQL Server Disaster Recovery helps you meet that goal by showing you how to think about and plan for potential problems. You’ll learn to anticipate and reduce the...
SharePoint 2007 Disaster Recovery Guide
SharePoint 2007 Disaster Recovery Guide

Microsoft’s SharePoint platform is a complex, diverse technical tool designed to meet a range of business needs and uses. It requires several other platforms and applications for implementation, and it can be integrated with other external line of business applications. This diversity also applies to the numerous methods, tools, and...

SAP HANA Cookbook
SAP HANA Cookbook

Your all-inclusive guide to understanding SAP HANA with practical recipes

Overview

  • Understand the architecture of SAP HANA, effectively transforming your business with the modeler and in-memory computing engine
  • Learn about Business Intelligence, Analytics, and Predictive analytics on top of...
Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library)
Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library)

This book presents innovative theories, methodologies, and techniques in the field of risk management and decision making. It introduces new research developments and provides a comprehensive image of their potential applications to readers interested in the area. The collection includes: computational intelligence applications in decision...

Linux Mint Essentials
Linux Mint Essentials

A practical guide to Linux Mint for the novice to the professional

About This Book

  • Learn to use Linux Mint like a pro, starting with the installation and going all the way through maintaining your system
  • Covers everything you need to know in order to be productive, including browsing the...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Information Resources in Toxicology, Fourth Edition
Information Resources in Toxicology, Fourth Edition
This latest version of Information Resources in Toxicology (IRT) continues a tradition established in 1982 with the publication of the first edition in presenting an extensive itemization, review, and commentary on the information infrastructure of the field. This book is a unique wide-ranging, international, annotated bibliography and compendium...
Planning for Survivable Networks
Planning for Survivable Networks
Keep your network safe from security disasters with a dependable recovery strategy

Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.

In the information-packed pages of this book, Annlee Hines shares her...

Mastering Microsoft Windows Vista Home: Premium and Basic
Mastering Microsoft Windows Vista Home: Premium and Basic
In-depth Coverage of Windows Vista Home Premium—Including Coverage of Vista Home Basic

Configure, run, and troubleshoot Windows Vista Home Premium or Windows Vista Home Basic with the detailed coverage you'll find in this comprehensive guide. With a task-based approach and clear, no-nonsense instructions,...

Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy