Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft DirectAccess Best Practices and Troubleshooting
Microsoft DirectAccess Best Practices and Troubleshooting

Secure and efficient functioning of your DirectAccess environment

Overview

  • Learn how to make Manage Out work for your DirectAccess clients without compromising your network
  • Learn how to understand enormous logfiles along with common troubleshooting criteria
  • Explore some...
Stochastic Analysis in Production Process and Ecology Under Uncertainty
Stochastic Analysis in Production Process and Ecology Under Uncertainty

The monograph addresses a problem of stochastic analysis based on the uncertainty assessment by simulation and application of this method in ecology and steel industry under uncertainty. The first chapter defines the Monte Carlo (MC) method and random variables in stochastic models. Chapter two deals with the contamination transport in porous...

Game Hacking: Developing Autonomous Bots for Online Games
Game Hacking: Developing Autonomous Bots for Online Games

You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.

Bring your knowledge of Windows-based development and memory management, and Game...

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your...

Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)
Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)

The book presents research work on face recognition using edge information as features for face recognition with ICA algorithms. The independent components are extracted from edge information. These independent components are used with classifiers to match the facial images for recognition purpose. In their study, authors have explored Canny...

Splunk Essentials
Splunk Essentials

Leverage the power of Splunk to efficiently analyze machine, log, web, and social media data

About This Book

  • Make impressive reports and dashboards easily
  • Search, locate, and manage apps in Splunk
  • Use the Twitter app to create a dashboard based on Twitter searches of...
Scalable Big Data Architecture: A practitioners guide to choosing relevant Big Data architecture
Scalable Big Data Architecture: A practitioners guide to choosing relevant Big Data architecture

This book highlights the different types of data architecture and illustrates the many possibilities hidden behind the term "Big Data", from the usage of No-SQL databases to the deployment of stream analytics architecture, machine learning, and governance.

Scalable Big Data Architecture covers real-world,...

Mastering Linux Shell Scripting
Mastering Linux Shell Scripting

Key Features

  • Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell scripts
  • Create and edit dynamic shell scripts to manage complex and repetitive tasks
  • Learn about scripting in Perl and programming in...
Elasticsearch: A Complete Guide
Elasticsearch: A Complete Guide

End-to-end Search and Analytics

About This Book

  • Solve your data analytics problems with the Elastic Stack
  • Improve your user search experience with Elasticsearch and develop your own Elasticsearch plugins
  • Design your index, configure it, and distribute it ― you'll...
Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
                 
One of the biggest challenges for organizations that have adopted microservice architecture is the lack of architectural, operational, and organizational standardization. After splitting a monolithic application or building a microservice ecosystem from scratch, many...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy