Cybersecurity Operations Handbook Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... Jitter, Noise, and Signal Integrity at High-Speed
State-of-the-art JNB and SI Problem-Solving: Theory, Analysis, Methods, and Applications
Jitter, noise, and bit error (JNB) and signal integrity (SI) have become today‘s greatest challenges in high-speed digital design. Now, there’s a...
Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Learn key reconnaissance concepts needed as a penetration tester
Attack and exploit key features, authentication, and sessions on web...
Microsoft® SQL Server® 2008 T-SQL Fundamentals (PRO-Developer) This book walks you through your first steps in T-SQL (also known as Transact-SQL), which is Microsoft SQL Server s dialect of the standard ANSI-SQL language. You ll learn the theory behind T-SQL querying and programming, how to develop T-SQL code to query and modify data, and get an overview of programmable objects. Although this book is intended...
Reliability, Maintainability and Risk: Practical Methods for Engineers 'The latest edition of this practical introduction to the basics of reliabilty, maintainability and safety introduces new sections on the accuracy of reliability prediction methods, common cause failures in systems, and expands and updates the descriptions of recent safety standards, in particular ISO 61508 and the use of 'Safety Integrity Levels'... Security In Wireless LANS And MANS (Artech House Computer Security) Wireless communications are becoming ubiquitous in homes, offices, and enterprises
with the popular IEEE 802.11 wireless LAN technology and the up-andcoming
IEEE 802.16 wireless MAN technology. The wireless nature of communications
defined in these standards makes it possible for an attacker to snoop on
|Result Page: 28 27 26 25 24 23 22 21 20 19 |