Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Pro PowerShell for Microsoft Azure
Pro PowerShell for Microsoft Azure

This book is written for Windows professionals who are familiar with PowerShell and want to learn to build, operate, and administer their Windows workloads in the Microsoft cloud. Pro PowerShell for Microsoft Azure is packed with practical examples and scripts, with easy-to-follow explanations for a wide range of day-to-day...

Mastering Windows Server 2016
Mastering Windows Server 2016
The IT pro's must-have guide to Windows Server 2016

Mastering Windows Server 2016 is a complete resource for IT professionals needing to get quickly up to date on the latest release. Designed to provide comprehensive information in the context of real-world usage, this book offers expert guidance through the new...

Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Land of Nuclear Enchantment: A New Mexican History of the Nuclear Weapons Industry
Land of Nuclear Enchantment: A New Mexican History of the Nuclear Weapons Industry

In this thoughtful social history of New Mexico's nuclear industry, Lucie Genay traces the scientific colonization of the state in the twentieth century from the points of view of the local people. Genay focuses on personal experiences in order to give a sense of the upheaval that accompanied the rise of the nuclear era. She...

The Best of the Best of Business Card Design (Graphic Design)
The Best of the Best of Business Card Design (Graphic Design)
A business card is more than a piece of paper with your name on it. It's your calling card; a snapshot of your brand identity, a constant reminder in your client's Rolodexes. Perhaps that's why Rockport's Best of Business Card Design Series is so eagerly anticipated year after year. Now, Rockport brings together the very best examples of...
Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy