 |
|
 Microsoft DirectAccess Best Practices and Troubleshooting
Secure and efficient functioning of your DirectAccess environment
Overview
-
Learn how to make Manage Out work for your DirectAccess clients without compromising your network
-
Learn how to understand enormous logfiles along with common troubleshooting criteria
-
Explore some...
|  |  Stochastic Analysis in Production Process and Ecology Under Uncertainty
The monograph addresses a problem of stochastic analysis based on the uncertainty assessment by simulation and application of this method in ecology and steel industry under uncertainty. The first chapter defines the Monte Carlo (MC) method and random variables in stochastic models. Chapter two deals with the contamination transport in porous... |  |  Game Hacking: Developing Autonomous Bots for Online Games
You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.
Bring your knowledge of Windows-based development and memory management, and Game... |
|
 Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your... |  |  |  |  Splunk Essentials
Leverage the power of Splunk to efficiently analyze machine, log, web, and social media data
About This Book
-
Make impressive reports and dashboards easily
-
Search, locate, and manage apps in Splunk
-
Use the Twitter app to create a dashboard based on Twitter searches of...
|
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |