Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
A Model for Calculating Interconnection Costs in Telecommunications
A Model for Calculating Interconnection Costs in Telecommunications
The liberalization of the telecommunications markets in Sub-Saharan Africa led to increased competition on the provision and pricing of communication services. But, due to the lack of appropriate regulatory tools, newly established regulators are poorly equipped to arbitrate increasing interconnection disputes between competing operators.
...
Distributed and Parallel Systems: From Cluster to Grid Computing
Distributed and Parallel Systems: From Cluster to Grid Computing
The sixthAustrian-HungarianWorkshop onDistributed and Parallel Systems is organized jointly byUniversity of Innsbruck and theMTASZTAKIComputer and Automation Research Institute. The series of workshops started as a small regional meeting early in the nineties, and since then it evolved a lot and became an acknowledged international scientific...
Technology, Design and Process Innovation in the Built Environment (Spon Research)
Technology, Design and Process Innovation in the Built Environment (Spon Research)
Buildings and infrastructure represent principal assets of any national economy as well as prime sources of environmental degradation. Making them more sustainable represents a key challenge for the construction, planning and design industries and governments at all levels; and the rapid urbanisation of the 21st century has turned this...
Autonomic Communication
Autonomic Communication

New paradigms for communication/networking systems are needed in order to tackle such emerging issues as heterogeneity, complexity and management of evolvable infrastructures, thus requiring approaches that are both task- and knowledge-driven. The networking and seamless integration of concepts, technologies and devices in a dynamically changing...

CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

VMware Horizon Workspace Essentials
VMware Horizon Workspace Essentials

Manage and deliver a secure, unified workspace to embrace any time, any place, anywhere access to corporate apps, data, and virtual desktops securely from any device

Overview

  • Design, install, and configure a Horizon Workspace infrastructure
  • Deliver a user's workspace to mobile devices...
MCSE Exam 70-294 Study Guide and DVD Training System: Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
MCSE Exam 70-294 Study Guide and DVD Training System: Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
All of Microsoft’s published objectives for the MCSE 70-
294 Exam are covered in this book. To help you easily
find the sections that directly support particular
objectives, we’ve listed all of the exam objectives
below, and mapped them to the Chapter number in
which they are covered. We’ve also assigned
...
Sas R 9.1.3 Etl Studio: User's Guide
Sas R 9.1.3 Etl Studio: User's Guide
This manual explains how to use SAS ETL Studio to specify metadata for sources, specify metadata for targets, and create jobs that specify how data is extracted, transformed, and loaded from sources to targets.

Features that are new in SAS ETL Studio 9.1.3 include the following:

Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

unlimited object storage image
Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy