Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Hadoop: The Definitive Guide
Hadoop: The Definitive Guide

Discover how Apache Hadoop can unleash the power of your data. This comprehensive resource shows you how to build and maintain reliable, scalable, distributed systems with the Hadoop framework -- an open source implementation of MapReduce, the algorithm on which Google built its empire. Programmers will find details for analyzing...

Springer Handbook of Nanotechnology
Springer Handbook of Nanotechnology

Since 2004 the Springer Handbook of Nanotechnology has established itself as the definitive reference in the nanoscience and nanotechnology area. It integrates the knowledge from nanofabrication, nanodevices, nanomechanics, Nanotribology, materials science, and reliability engineering in just one volume. Beside the presentation of...

Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

ADO.NET 3.5 Cookbook
ADO.NET 3.5 Cookbook

This guide is strikingly different from other books on Microsoft ADO.NET. Rather than load you down with theory, the new edition of ADO.NET 3.5 Cookbook gives you more than 200 coding solutions and best practices for real problems you're likely to face with this technology using Visual Studio...

SSL & TLS Essentials: Securing the Web
SSL & TLS Essentials: Securing the Web
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security...
Oracle Application Express Administration: For DBAs and Developers
Oracle Application Express Administration: For DBAs and Developers

Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
A comprehensive overview of managing and assessing safety and functionality of ageing offshore structures and pipelines
A significant proportion, estimated at over 50%, of the worldwide infrastructure of offshore structures is in a life extension phase and is vulnerable to ageing processes. This book captures the central
...
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook is at once eye candy, artistic inspiration, and incomparable technical guidance for intermediate-to-advanced digital imaging professionals, graphic artists, photographers, and just about anyone involved in creating digital images or animations. A visual splendor, this full-color book...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy