Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Search Analytics for Your Site
Search Analytics for Your Site

Any organization that has a searchable web site or intranet is sitting on top of hugely valuable and usually under-exploited data: logs that capture what users are searching for, how often each query was searched, and how many results each query retrieved. Search queries are gold: they are real data that show us exactly what users are...

Pro SQL Server Internals
Pro SQL Server Internals

Pro SQL Server Internals explains how different SQL Server components work "under the hood" and how they communicate with each other. This is the practical book with a large number of examples that will show you how various design and implementation decisions affect the behavior and performance of your systems.

...
XDoclet in Action (In Action series)
XDoclet in Action (In Action series)
A guide to the new XDoclet development tool that eliminates programming busy work by automatically generating code and other deployment artifacts, this book enables developers who place metadata in a single source code file to use XDoclet to generate additional source code and other files that are required in a project. Both smaller code...
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Cisco Access Control Security : AAA Administration Services
Cisco Access Control Security : AAA Administration Services

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Hands-on techniques for enabling authentication, authorization, and
...

Hadoop Operations
Hadoop Operations
Over the past few years, there has been a fundamental shift in data storage, management, and processing. Companies are storing more data from more sources in more formats than ever before. This isn’t just about being a “data packrat” but rather building products, features, and intelligence predicated on knowing more about...
The Pain Survival Guide: How to Reclaim Your Life (APA Lifetools)
The Pain Survival Guide: How to Reclaim Your Life (APA Lifetools)

If you suffer from chronic pain, this proven 10-step program brings hope and relief, showing you how gradual changes in specific behaviors can lead to great improvements in your ability to cope. Psychologists Turk and Winters' recommendations are based on solid research that shows what works and on their success with thousands of...

Troubleshooting Windows Server with PowerShell
Troubleshooting Windows Server with PowerShell

This book shows you how to use PowerShell to quickly pinpoint, diagnose, and solve problems with your Windows Server environment, reducing the need for external tools, and ensuring you stay up-to-date with PowerShell as it quickly becomes one of the most useful tools in an administrator’s toolkit.

Authors Derek Schauland and...

Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics

Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.

This book builds upon the skills you learned in Volume 1...

Microservices Deployment Cookbook
Microservices Deployment Cookbook

Key Features

  • Adopt microservices-based architecture and deploy it at scale
  • Build your complete microservice architecture using different recipes for different solutions
  • Identify specific tools for specific scenarios and deliver immediate business results, correlate use cases, and adopt them...
Portable DBA: Oracle
Portable DBA: Oracle
This handy, affordable reference is ideal for on-the-job DBAs in need of quick access to administrative commands, error resolutions, and best practices. Covering the most commonly used Oracle database versions, the book contains invaluable tables so problems can be diagnosed quickly and includes examples and syntax diagrams for each command. ...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy