Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Handbook of High Performance Virtual Teams: A Toolkit for Collaborating Across Boundaries
The Handbook of High Performance Virtual Teams: A Toolkit for Collaborating Across Boundaries
The Handbook of High-Performance Virtual Teams

The Handbook of High-Performance Virtual Teams is an essential resource for leaders, virtual team members, and work group leaders. The editors provide a proven framework based on five principles for working collaboratively across boundaries of time, space, and culture. Written by experts in the...

Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

CCSP SECUR Exam Cram 2 (642-501)
CCSP SECUR Exam Cram 2 (642-501)

Exam Cram 2 fills the needs of 1,000s of Certified Security Specialists and new security cert candidates looking to upgrade to a CCSP.

  • SECUR is the first and most important of the 5 required exams to obtain a CCSP.

  • ...
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

Head First PHP & MySQL (A Brain-Friendly Guide)
Head First PHP & MySQL (A Brain-Friendly Guide)
If you're ready to create web pages more complex than those you can build with HTML and CSS, Head First PHP & MySQL is the ultimate learning guide to building dynamic, database-driven websites using PHP and MySQL. Packed with real-world examples, this book teaches you all the essentials of server-side programming, from the fundamentals...
Developing with Couchbase Server
Developing with Couchbase Server

Today’s highly interactive websites pose a challenge for traditional SQL databases—the ability to scale rapidly and serve loads of concurrent users. With this concise guide, you’ll learn how to build web applications on top of Couchbase Server 2.0, a NoSQL database that can handle websites and social media where...

ARIS Design Platform: Getting Started with BPM
ARIS Design Platform: Getting Started with BPM
This practical "how-to" guide to both using the ARIS Design Platform and, more importantly, how to use it to create real business models, follows Rob Davis’ hugely successful, Business Process Modelling with ARIS (Springer 2001). This second volume describes the ARIS Business Architect and ARIS Business Designer web clients...
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy