Home | Amazing | Today | Tags | Publishers | Years | Search 
Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
This unique and critical book shares no-fail secrets for building software and offers tried-and-true practices and principles for software design, development, and testing for mission-critical systems that must not fail. A veteran software architect walks you through the lifecycle of a project as well as each area of production...
Unix Unleashed (4th Edition)
Unix Unleashed (4th Edition)
Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic...
The Least Worst Place - How Guantanamo Became the World’s Most Notorious Prison
The Least Worst Place - How Guantanamo Became the World’s Most Notorious Prison
The prisoner’s cry pierced through the hot Caribbean air. It was not the first time that such a shriek had roused the rest of the detainees from their daily lethargy. But this time it brought them to their feet and unleashed a flurry of noise, as they pounded the cement floors and rattled the wire mesh of their cells. An invisible force...
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure—recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager’s Guide to Disasters:...

Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Today's IT environment is very complex, encompassing a myriad of technologies and middleware platforms. Many organizations have large and heterogeneous middleware platforms that power their enterprise applications and it is often a real challenge for administrators to meet agreed service levels and minimize downtime. Oracle Enterprise Manager...
The Art of Scalability: Scalable Web Architecture, Processes, and Organizations for the Modern Enterprise
The Art of Scalability: Scalable Web Architecture, Processes, and Organizations for the Modern Enterprise

“This book is much more than you may think it is. Scale is not just about designing Web sites that don’t crash when lots of users show up. It is about designing your company so that it doesn’t crash when your business needs to grow. These guys have been there on the front lines of some of the most...

North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)

This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...

Windows Forensic Analysis DVD Toolkit, Second Edition
Windows Forensic Analysis DVD Toolkit, Second Edition

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior
...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

Finite Antenna Arrays and FSS
Finite Antenna Arrays and FSS

A periodic surface is an assembly of identical elements arranged in a one or two-dimensional array. Such surfaces have various effects on incident electromagnetic waves. Their applications range from antennas to stealth aircraft.This book discusses finite antenna arrays and how to minimize the radar cross section of these arrays.

...

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware,...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy