|
|
|
|
|
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a
bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche
is a process that builds new information upon previous knowledge as we learn. As Isaac Newton
said, “If I have seen further than... | | Lean Six Sigma Demystified: A Self-Teaching Guide
Whenever I say the words Lean Six Sigma, people’s eyes automatically glaze over
as visions of complex statistical formulas dance in their heads. If you feel this way,
you’re not alone. I have found that many people have a phobia of anything
resembling math or technology. Sometimes both. Well, let me set your fears to... | | Makers at Work: Folks Reinventing the World One Object or Idea at a Time
What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? A “maker,” of course. Playful and creative, makers are—through expertise and experimentation—creating art, products, and processes that change the way we think and interact with the... |
|
| | Linux Server Security: Hack and Defend
Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server... | | Implementing OpenShift
The cloud is a liberating environment when you learn to master OpenShift. Follow this practical tutorial to develop and deploy applications in the cloud and use OpenShift for your own Platform-as-a-Service.
Overview
-
Discover what the cloud is, tear through the marketing jargon, and go right to the...
|
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |