Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Design Patterns in Modern C++: Reusable Approaches for Object-Oriented Software Design
Design Patterns in Modern C++: Reusable Approaches for Object-Oriented Software Design
Apply modern C++17 to the implementations of classic design patterns. As well as covering traditional design patterns, this book fleshes out new patterns and approaches that will be useful to C++ developers. The author presents concepts as a fun investigation of how problems can be solved in different ways, along the way using varying...
Applied Data Science with Python and Jupyter: Use powerful industry-standard tools to unlock new, actionable insights from your data
Applied Data Science with Python and Jupyter: Use powerful industry-standard tools to unlock new, actionable insights from your data

Become the master player of data exploration by creating reproducible data processing pipelines, visualizations, and prediction models for your applications.

Key Features

  • Get up and running with the Jupyter ecosystem and some example datasets
  • Learn about key machine...
Crushing the IT Gender Bias: Thriving as a Woman in Technology
Crushing the IT Gender Bias: Thriving as a Woman in Technology
When my career first began, I was on a team of five women Database Administrators (DBAs). Within 9 months, one of the five who was hired at the same time as I was left the industry. She was young, single, had a degree in Computer Science (CS) with a focus on database technology, and had no children. I had difficulty understanding...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data

Getting started with data science doesn't have to be an uphill battle. This step-by-step guide is ideal for beginners who know a little Python and are looking for a quick, fast-paced introduction.

Key Features

  • Get up and running with the Jupyter ecosystem and some example datasets
  • ...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future
The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future

The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future presents an investigation into the rationale for ERP by raising key questions that managers should ask themselves prior to considering ERP, including processes that should be followed in planning when acquiring ERP.

It concentrates on the impact...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Maximizing .NET Performance (Expert's Voice)
Maximizing .NET Performance (Expert's Voice)

Maximizing .NET Performance is the first book dedicated entirely to providing developers and architects with information on .NET Framework performance. .NET is a technology with a vast surface area, and coverage of every aspect of performance relevant to all .NET technologies is not possible within a single volume. This book...

Learning Java Functional Programming
Learning Java Functional Programming

Create robust and maintainable Java applications using the functional style of programming

About This Book

  • Explore how you can blend object-oriented and functional programming styles in Java
  • Use lambda expressions to write flexible and succinct code
  • A tutorial that...
Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. 

This book helps you understand forensics in relation to Oracle Database, and the tools and
...
Result Page: 33 32 31 30 29 28 27 26 25 24 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy