Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

The Science Book: From Darwin to Dark Energy, 250 Milestones in the History of Science (Sterling Milestones)
The Science Book: From Darwin to Dark Energy, 250 Milestones in the History of Science (Sterling Milestones)
From astronomy to psychology, this beautifully illustrated chronology presents the most important and groundbreaking milestones in science. 
 
Award-winning author Cliff Pickover (The Math Book, The Physics Book, and The Medical Book) gathers into one fully illustrated volume
...
Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Kernel Methods for Pattern Analysis
Kernel Methods for Pattern Analysis
'Kernel methods form an important aspect of modern pattern analysis, and this book gives a lively and timely account of such methods. ... if you want to get a good idea of the current research in this field, this book cannot be ignored.' SIAM Review '... the book provides an excellent overview of this growing field. I highly recommend it to those...
Functional Programming: A PragPub Anthology: Exploring Clojure, Elixir, Haskell, Scala, and Swift
Functional Programming: A PragPub Anthology: Exploring Clojure, Elixir, Haskell, Scala, and Swift

Explore functional programming and discover new ways of thinking about code. You know you need to master functional programming, but learning one functional language is only the start. In this book, through articles drawn from PragPub magazine and articles written specifically for this book, you'll explore functional...

Methionine Dependence of Cancer and Aging: Methods and Protocols (Methods in Molecular Biology, 1866)
Methionine Dependence of Cancer and Aging: Methods and Protocols (Methods in Molecular Biology, 1866)

This book explores the methionine dependence of cancer and its effects on aging, a great story of science that is not widely known. The chapters in this book describe the discovery of methionine dependence of cancer; the molecular basis for the increased methionine demand of cancer cells and tumors; the clinical application of...

CORS in Action: Creating and consuming cross-origin APIs
CORS in Action: Creating and consuming cross-origin APIs

Summary

CORS in Action introduces Cross-Origin Resource Sharing (CORS) from both the server and the client perspective. It starts with the basics: how to make CORS requests and how to implement CORS on the server. It then explores key details such as performance, debugging, and security. API authors will...

Oracle Enterprise Manager 12c Administration Cookbook
Oracle Enterprise Manager 12c Administration Cookbook

Over 50 practical recipes to install, configure, and monitor your Oracle setup using Oracle Enterprise Manager

Overview

  • Recipes for installing, configuring, and getting up and running with Oracle Enterprise Manager.
  • Set up automatic discovery, create and clone databases, and perform...
Building Microservices with Go
Building Microservices with Go

Key Features

  • This short, concise, and practical guide is packed with real-world examples of building microservices with Go
  • It is easy to read and will benefit smaller teams who want to extend the functionality of their existing systems
  • Using this practical approach will save your money in...
Curious Encounters: Voyaging, Collecting, and Making Knowledge in the Long Eighteenth Century (UCLA Clark Memorial Library Series)
Curious Encounters: Voyaging, Collecting, and Making Knowledge in the Long Eighteenth Century (UCLA Clark Memorial Library Series)

With contributions from historians, literary critics, and geographers, Curious Encounters uncovers a rich history of global voyaging, collecting, and scientific exploration in the long eighteenth century. Leaving behind grand narratives of discovery, these essays collectively restore a degree of symmetry and contingency to our...

Building a Monitoring Infrastructure with Nagios
Building a Monitoring Infrastructure with Nagios
Build real-world, end-to-end network monitoring solutions with Nagios

 

This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David...

Pattern Recognition From Classical to Modern Approaches
Pattern Recognition From Classical to Modern Approaches

Recognizing patterns is at the core of man's attempts to understand the universe that we inhabit. Through the development of sensors and instruments, we have extended our ability to gather data far beyond the range and scale of man's natural senses. As a result we are now able to gather data on phenomena occurring in the far reaches...

unlimited object storage image
Result Page: 61 60 59 58 57 56 55 54 53 52 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy