Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity and Access Management: Business Performance Through Connected Intelligence
Identity and Access Management: Business Performance Through Connected Intelligence

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Character Recognition Systems: A Guide for Students and Practitioners
Character Recognition Systems: A Guide for Students and Practitioners
"Much of pattern recognition theory and practice, including methods such as Support Vector Machines, has emerged in an attempt to solve the character recognition problem. This book is written by very well-known academics who have worked in the field for many years and have made significant and lasting contributions. The book will no doubt be...
Google Cloud Platform for Developers: Build highly scalable cloud solutions with the power of Google Cloud Platform
Google Cloud Platform for Developers: Build highly scalable cloud solutions with the power of Google Cloud Platform

Develop, deploy, and scale your applications with Google Cloud Platform

Key Features

  • Create and deploy your applications on Google Cloud Platform
  • Store and manage source code and debug Cloud-hosted apps with plugins and IDEs
  • Streamline developer workflows...
The Power of Impossible Thinking: Transform the Business of Your Life and the Life of Your Business
The Power of Impossible Thinking: Transform the Business of Your Life and the Life of Your Business

50,000 copies sold, now in paperback... If you can think impossible thoughts, then you can do impossible things!!

  • The power of change: create new thinking for new solutions!
  • Includes a new introduction demonstrating the "power of impossible thinking," plus access to exclusive book...
Learning AWS OpsWorks
Learning AWS OpsWorks

Learn how to exploit advanced technologies to deploy and auto-scale web stacks

Overview

  • Discover how a DevOps cloud management solution can accelerate your path to delivering highly scalable infrastructure and applications
  • Learn about infrastructure automation, auto-scaling, and distributed...
Dearly Departed: Everything You Want to Know About the Afterlife
Dearly Departed: Everything You Want to Know About the Afterlife

Drawing on a lifetime's experience interacting with those who have passed over, psychic intuitive Georgina Walker shares a wealth of real life stories about the afterlife in this comforting volume. She addresses the most frequent questions of the bereaved concerning the dead, including what...

Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy