Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
Elasticsearch: A Complete Guide
Elasticsearch: A Complete Guide

End-to-end Search and Analytics

About This Book

  • Solve your data analytics problems with the Elastic Stack
  • Improve your user search experience with Elasticsearch and develop your own Elasticsearch plugins
  • Design your index, configure it, and distribute it ― you'll...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
Build Your Own Electric Vehicle
Build Your Own Electric Vehicle
Go Green-Go Electric! Faster, Cheaper, More Reliable While Saving Energy and the Environment

This new, updated edition of Build Your Own Electric Vehicle contains everything that made the first edition so popular while adding all the technological advances and new parts that are readily available on the market...

Handbook on Data Envelopment Analysis (International Series in Operations Research & Management Science)
Handbook on Data Envelopment Analysis (International Series in Operations Research & Management Science)

This handbook covers DEA topics that are extensively used and solidly based. The purpose of the handbook is to (1) describe and elucidate the state of the field and (2), where appropriate, extend the frontier of DEA research. It defines the state-of-the-art of DEA methodology and its uses. This handbook is intended to represent a milestone in...

Web-Weaving: Intranets, Extranets, and Strategic Alliances
Web-Weaving: Intranets, Extranets, and Strategic Alliances
Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. `Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and...
Hierarchical Voronoi Graphs: Spatial Representation and Reasoning for Mobile Robots
Hierarchical Voronoi Graphs: Spatial Representation and Reasoning for Mobile Robots

Voronoi graphs and their hierarchical extensions have become a widely used tool for deriving abstract spatial representations from environmental data. They are currently being studied and applied in several subfields of computer science such as AI and robotics, computational geometry, and geoinformatics.

This book investigates the...

Pro HTML5 with Visual Studio 2012
Pro HTML5 with Visual Studio 2012
HTML5 is such an exciting opportunity for software developers. For a long time, the web has been the favorite platform for providing software applications to both external and internal users because of its reach and ease of deployment and maintenance. The primary limitation has been the client-side support, which can severely limit...
Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

NuGet 2 Essentials
NuGet 2 Essentials

A clearly written guide for .NET developers who want to get to grips with the NuGet package manager. Filled with practical examples, it leads up to teaching you how to set up your own internal server.

Overview

  • Easily find and refer third-party libraries from your projects
  • Create packages...
Pro .NET Memory Management: For Better Code, Performance, and Scalability
Pro .NET Memory Management: For Better Code, Performance, and Scalability
Understand .NET memory management internal workings, pitfalls, and techniques in order to effectively avoid a wide range of performance and scalability problems in your software. Despite automatic memory management in .NET, there are many advantages to be found in understanding how .NET memory works and how you can best write...
unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy