Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Ambient intelligence (AmI) is an element of pervasive computing that brings smartness to living and business environments to make them more sensitive, adaptive, autonomous and personalized to human needs. It refers to intelligent interfaces that recognise human presence and preferences, and adjust smart environments to suit their...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Practical jQuery
Practical jQuery

Practical jQuery is your step-by-step guide to using jQuery in the real world, taking you from downloading jQuery all the way to extending it by writing your own plug-ins and testing the DOM using QUnit. jQuery is one of today’s most popular JavaScript web application development frameworks and libraries. While getting started...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

DevOps with Kubernetes: Accelerating software delivery with container orchestrators
DevOps with Kubernetes: Accelerating software delivery with container orchestrators

Learn to implement DevOps using Docker & Kubernetes.

About This Book

  • Learning DevOps, container, and Kubernetes within one book.
  • Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently.
  • A practical guide towards container management and...
Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js
Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js

Explore the essentials of blockchain technology with JavaScript to develop highly secure bitcoin-like applications

Key Features

  • Develop bitcoin and blockchain-based cryptocurrencies using JavaScript
  • Create secure and high-performant blockchain networks
  • ...
JavaScript Cookbook
JavaScript Cookbook

Problem solving with JavaScript is a lot trickier now that its use has expanded considerably in size, scope, and complexity. This cookbook has your back, with recipes for common tasks across the JavaScript world, whether you’re working in the browser, the server, or a mobile environment. Each recipe includes reusable code and...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance

This book explores diversity in boardrooms to highlight the link between the heterogeneous dimensions of board diversity and their impact on the firms. The book provides a brief definition of corporate governance and focuses on the role and functions of the board of directors. The work contributes to the literature enriching the...

Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

Learn how to quickly set up the test automation tool WebdriverIO, one of the major Node.js-based test frameworks. Software testing is here to stay, and an integral part of this is test automation. Dive into the amazing possibilities that WebDriverIO offers to automate browser interactions for a user of any web application. 

...
unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy