Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
This book outlines an integrative framework for business-model innovation in the paradigm of the Internet of Things. It elaborates several tools and methodologies for the quantitative, qualitative, analytical and effectual evaluation, and analyzes their applicability and efficiency for several phases of the business-model innovation process. As...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
The Stress Management Handbook: A Practical Guide to Staying Calm, Keeping Cool, and Avoiding Blow-Ups
The Stress Management Handbook: A Practical Guide to Staying Calm, Keeping Cool, and Avoiding Blow-Ups
Shift negativity into positivity in seconds.

Happiness comes from getting what we want, be it love, recognition, money, and support, among others. But most people, in their search for happiness, find themselves pleasing everyone else over themselves until they end up with feelings of resentment, frustration, and
...
Practical jQuery
Practical jQuery

Practical jQuery is your step-by-step guide to using jQuery in the real world, taking you from downloading jQuery all the way to extending it by writing your own plug-ins and testing the DOM using QUnit. jQuery is one of today’s most popular JavaScript web application development frameworks and libraries. While getting started...

PowerShell in Depth: An administrator's guide
PowerShell in Depth: An administrator's guide

Summary

PowerShell in Depth is the kind of book you'll want open on your desk most of the time. With 40 short chapters, each focused on a specific area of PowerShell, you'll be able to find the answers you need quickly. Each chapter is concise and to-the-point, so you can spend less time reading and...

.Net Framework 4.5 Expert Programming Cookbook
.Net Framework 4.5 Expert Programming Cookbook

.Net is an architecture neutral and programming language agnostic framework that caters to all requirements, varying from business solutions to multiplayer online 3D games. Version 4.5 added many new features to help with the development of robust and user-friendly solutions. This book will teach you the new features as well as the advanced...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences
  • ...
The Third Pillar: How Markets and the State Leave the Community Behind
The Third Pillar: How Markets and the State Leave the Community Behind
Shortlisted for the Financial Times/McKinsey Business Book of the Year Award

From one of the most important economic thinkers of our time, a brilliant and far-seeing analysis of the current populist backlash against globalization.


Raghuram Rajan, distinguished University of Chicago
...
eThekwini’s Green and Ecological Infrastructure Policy Landscape: Towards a Deeper Understanding
eThekwini’s Green and Ecological Infrastructure Policy Landscape: Towards a Deeper Understanding
This book offers the reader a deeper understanding of the eThekwini Metropolitan Municipality’s green and ecological infrastructure policy landscape. The author utilises the PULSE3 analytical framework to conduct an in-depth examination and to show how experts frame and implement the municipality’s green and ecological infrastructure...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
unlimited object storage image
Result Page: 285 284 283 282 281 280 279 278 277 276 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy