Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your...

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the...

Python Programming for Arduino
Python Programming for Arduino

Develop practical Internet of Things prototypes and applications with Arduino and Python

About This Book

  • Transform your hardware ideas into real-world applications using Arduino and Python
  • Design and develop hardware prototypes, interactive user interfaces, and cloud-connected...
PMP Rapid Review
PMP Rapid Review
Be one of the thousands of people to pass the PMP Examination using Sean's materials!!
Assess your readiness for the updated PMP Exam--and quickly identify where you need to focus and practice using material organized by the actual exam topics you will be tested on from the PMP Examination Content Outline! No other PMP
...
Using Event-B for Critical Device Software Systems
Using Event-B for Critical Device Software Systems

Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).

This is assessed...

Exam 70-410 Installing and Configuring Windows Server 2012 Lab Manual
Exam 70-410 Installing and Configuring Windows Server 2012 Lab Manual

This course is part one in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.
 

...

Ambient Intelligence - Software and Applications: 4th International Symposium on Ambient Intelligence (ISAmI 2013 (Advances in Intelligent Systems and Computing)
Ambient Intelligence - Software and Applications: 4th International Symposium on Ambient Intelligence (ISAmI 2013 (Advances in Intelligent Systems and Computing)

Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable.

Another main concern of AmI originates from the human computer interaction domain and focuses on...

Architectures for Baseband Signal Processing
Architectures for Baseband Signal Processing

This book addresses challenges faced by both the algorithm designer and the chip designer, who need to deal with the ongoing increase of algorithmic complexity and required data throughput for today’s mobile applications. The focus is on implementation aspects and implementation constraints of individual components that are needed in...

Manual of Forensic Taphonomy
Manual of Forensic Taphonomy

Forensic taphonomy is the study of the postmortem changes to human remains, focusing largely on environmental effects―including decomposition in soil and water and interaction with plants, insects, and other animals. While other books have focused on subsets such as forensic botany and entomology, Manual of Forensic Taphonomy is...

Cassandra High Availability
Cassandra High Availability

Apache Cassandra is a massively scalable, peer-to-peer database designed for 100 percent uptime, with deployments in the tens of thousands of nodes supporting petabytes of data. This book offers readers a practical insight into building highly available, real-world applications using Apache Cassandra. ...

Advanced Clinical Skills for GU Nurses (Wiley Series in Nursing)
Advanced Clinical Skills for GU Nurses (Wiley Series in Nursing)

This book has been developed to help nurses who are in nurse practitioner roles by supporting them to develop their 'advanced practice skills'. This book is intended to build on skills and knowledge that nurses will have acquired at staff nurse level. It is intended that this book will develop skills and knowledge which until recently...

Learning Cypher
Learning Cypher

Write powerful and efficient queries for Neo4j with Cypher, its official query language

About This Book

  • Improve performance and robustness when you create, query, and maintain your graph database
  • Save time by writing powerful queries using pattern matching
  • Step-by-step...
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy