Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your...
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the...
Be one of the thousands of people to pass the PMP Examination using Sean's materials!!
Assess your readiness for the updated PMP Exam--and quickly identify where you need to focus and practice using material organized by the actual exam topics you will be tested on from the PMP Examination Content Outline! No other PMP...
Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).
This course is part one in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.
Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable.
Another main concern of AmI originates from the human computer interaction domain and focuses on...
This book addresses challenges faced by both the algorithm designer and the chip designer, who need to deal with the ongoing increase of algorithmic complexity and required data throughput for today’s mobile applications. The focus is on implementation aspects and implementation constraints of individual components that are needed in...
Forensic taphonomy is the study of the postmortem changes to human remains, focusing largely on environmental effectsâincluding decomposition in soil and water and interaction with plants, insects, and other animals. While other books have focused on subsets such as forensic botany and entomology, Manual of Forensic Taphonomy is...
Apache Cassandra is a massively scalable, peer-to-peer database designed for 100 percent uptime, with deployments in the tens of thousands of nodes supporting petabytes of data. This book offers readers a practical insight into building highly available, real-world applications using Apache Cassandra. ...
This book has been developed to help nurses who are in nurse practitioner roles by supporting them to develop their 'advanced practice skills'. This book is intended to build on skills and knowledge that nurses will have acquired at staff nurse level. It is intended that this book will develop skills and knowledge which until recently...