Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies,...

Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition

A practical guide to Windows Server 2019 and PowerShell

Key Features

  • Use PowerShell to effectively configure and administer Windows Server 2019
  • Improve the performance of new features such as DevOps and containers using PowerShell
  • Enhance PowerShell's...
Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
The book constitutes the refereed proceedings of the 13th EAI International Conference on Communications and Networking, held in October 2018 in Chengdu, China. The 71 papers presented were carefully selected from 114 submissions. The papers are organized in topical sections on wireless communications and networking, next...
Networking Fundamentals
Networking Fundamentals

A clear and concise resource on Windows networking, perfect for IT beginners

Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network...

Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research...
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
This book explores the interconnected ways in which the control of knowledge has become central to the exercise of political, economic, and social power. Building on the work of International Political Economy scholar Susan Strange, this multidisciplinary volume features experts from political science, anthropology, law, criminology,...
The Portal
The Portal
For thousands of years, the question has been asked: How do you get through the turbulence of life?

We are hurtling towards a pivotal moment for humanity, a point in time when what we do next could determine the future of our species. Economic, environmental, technological and humanitarian experts suggest we are
...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Result Page: 340 339 338 337 336 335 334 333 332 331 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy