Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition

A practical guide to Windows Server 2019 and PowerShell

Key Features

  • Use PowerShell to effectively configure and administer Windows Server 2019
  • Improve the performance of new features such as DevOps and containers using PowerShell
  • Enhance PowerShell's...
SHARKS in the MOAT: How to Create Truly Secure Software
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies,...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Hands-On Data Structures and Algorithms with Rust: Learn programming techniques to build effective, maintainable, and readable code in Rust 2018
Hands-On Data Structures and Algorithms with Rust: Learn programming techniques to build effective, maintainable, and readable code in Rust 2018

Design and implement efficient programs by exploring modern Rust data structures and algorithms

Key Features

  • Use data structures such as arrays, stacks, trees, lists, and graphs with real-world examples
  • Learn the functional and reactive implementations of traditional data...
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions

Discover the pillars of AWS infrastructure automation, starting with API-driven infrastructure concepts and its immediate benefits such as increased agility, automation of the infrastructure life cycle, and flexibility in experimenting with new architectures. With this base established, the book discusses infrastructure-as-code...

Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition
Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition

Unleash the power of VMware vSphere 6.7 to develop a powerful, flexible, and secure digital infrastructure

Key Features

  • Explore management, security, scalability, and availability with vSphere 6.7
  • Design, deploy, and manage VMware vSphere virtual datacenters
  • ...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Hybrid Cloud for Architects: Build robust hybrid cloud solutions using AWS and OpenStack
Hybrid Cloud for Architects: Build robust hybrid cloud solutions using AWS and OpenStack

Build your own hybrid cloud strategy with this comprehensive learning guide.

Key Features

  • Build a hybrid cloud strategy for your organization with AWS and OpenStack
  • Leverage Hybrid Cloud to design a complex deployment pipeline
  • Learn to implement security...
Mastering Windows Server 2019: The complete guide for IT professionals to install and manage Windows Server 2019 and deploy new capabilities, 2nd Edition
Mastering Windows Server 2019: The complete guide for IT professionals to install and manage Windows Server 2019 and deploy new capabilities, 2nd Edition

Enhance and secure your datacenter with the newest Microsoft server platform

Key Features

  • Develop necessary skills to design and implement Microsoft Server 2019 in enterprise environment
  • Provide support to your medium to large enterprise and leverage your experience in...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Result Page: 117 116 115 114 113 112 111 110 109 108 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy