Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Pro SQL Server 2005
Pro SQL Server 2005
This book provides a critical examination of all of the major new functionality in SQL Server 2005,
covering such diverse topics as CLR integration, the new management tools, SQL Server Integration
Services, Service Broker, Transact-SQL (T-SQL) programming, and database mirroring.

The book does not profess or even try to be a
...
Modern Control Technology: Components and Systems
Modern Control Technology: Components and Systems
Modern Control Technology: Components and Systems, 2nd Edition provides an introduction to automatic control systems and components that is both comprehensive and up-to-date. Logically organized, this book takes the reader on a journey through a control system. Each chapter examines a different functional part, followed by discussion of control...
Machine Learning, Neural and Statistical Classification (Ellis Horwood Series in Artificial Intelligence)
Machine Learning, Neural and Statistical Classification (Ellis Horwood Series in Artificial Intelligence)
The aim of this book is to provide an up-to-date review of different approaches to classification,
compare their performance on a wide range of challenging data-sets, and draw
conclusions on their applicability to realistic industrial problems.

Before describing the contents, we first need to define what we mean by
...
Enterprise Information Systems VI
Enterprise Information Systems VI
This book contains the best papers of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004), held in Porto (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with PORTUCALENSE UNIVERSITY, who hosted the event.

Following the
...
The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma
The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma
Alan Turing was one of the most important and influential thinkers of the 20th century. This volume makes his key writings available to a non-specialist readership for the first time. They make fascinating reading both in their own right and for their historic significance: contemporary
computational theory, cognitive science, and artificial
...
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
This two-volume book covers the recent applications of computational intelligence techniques in reliability engineering. Research in the area of computational intelligence is growing rapidly due to the many successful applications of these new techniques in very diverse problems. “Computational Intelligence” covers many fields such as...
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Evolutionary computing paradigms offer robust and powerful adaptive search mechanisms for system design. This book includes thirteen chapters covering a wide area of topics in evolutionary computing and applications including: Introduction to evolutionary computing in system design; evolutionary neuro-fuzzy systems; evolution of fuzzy controllers;...
Dungeons & Dragons  Dummies
Dungeons & Dragons Dummies
Caught in traffic. Trapped in a cubicle. Stuck in a rut.  Tangled up in red tape.

In the real world, sometimes you feel powerless—but not in Dungeons & Dragons (D & D). In this fantasy-adventure, you have all kinds of special powers. You can slay the evil dragon, overcome the orc or the ogre, haunt the...

Modular Java: Creating Flexible Applications with OSGi and Spring
Modular Java: Creating Flexible Applications with OSGi and Spring
The secret weapon for attacking complexity in any project is to break it down into smaller, cohesive, and more easily digestible pieces. With Modular Java, you can easily develop applications that are more flexible, testable, maintainable, and comprehensible.

Modular Java is a pragmatic guide to developing modular
...
Autonomic Communication
Autonomic Communication

New paradigms for communication/networking systems are needed in order to tackle such emerging issues as heterogeneity, complexity and management of evolvable infrastructures, thus requiring approaches that are both task- and knowledge-driven. The networking and seamless integration of concepts, technologies and devices in a dynamically changing...

Real World SharePoint 2010: Indispensable Experiences from 22 MVPs
Real World SharePoint 2010: Indispensable Experiences from 22 MVPs

Proven real-world best practices from leading Microsoft SharePoint MVPs

SharePoint enables Web sites to host shared workspaces and is a leading solution for Enterprise Content Management. The newest version boasts significant changes, impressive enhancements, and new features, requiring developers and administrators of all...

unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy