Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Project Management JumpStart
Project Management JumpStart

Project Management JumpStart gives you the solid grounding you need to approach a career in project management with confidence.

  • The basic skills of a successful project manager
  • Creating project schedules and determining project budgets
  • Winning the support of department managers
  • ...
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Microsoft(R) Operations Manager 2005 Unleashed (MOM): With A Preview of Operations Manager 2007
Microsoft(R) Operations Manager 2005 Unleashed (MOM): With A Preview of Operations Manager 2007
With the licensing of NetIQ’s Operation Manager technology in 2000, Microsoft sent a message that it was serious about server monitoring and management. This message was well received; those production environments running Windows servers and using a Microsoft infrastructure require tools to help them be proactive in managing those servers...
Network Management Know It All (Morgan Kaufmann Know It All)
Network Management Know It All (Morgan Kaufmann Know It All)
This book brings all of the elements of network management together in a single volume by the best and brightest experts in the field!

Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems, which includes
...
Sun Web Server: The Essential Guide
Sun Web Server: The Essential Guide

The authoritative, comprehensive guide to Sun Web Server 7.0

 

Sun Web Server is the secure web serving platform of choice for large-scale enterprises in industries from finance and telecommunications to travel and government. Now there’s a...

Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Get a 360-degree view of digital project management. Learn proven best practices from case studies and real-world scenarios. A variety of project management tools, templates, models, and frameworks are covered.

This book provides an in-depth view of digital project management from initiation to execution to monitoring and
...
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis,...
Google App Engine Java and GWT Application Development
Google App Engine Java and GWT Application Development

Google Application Engine is a cloud computing technology that lets you run web applications that are easy to build and maintain as well as being scaled and load-balanced automatically. To build interesting and interactive web applications developers are turning to Java. However, building and deploying scalable web applications using Google...

The DevOps 2.1 Toolkit: Docker Swarm: Building, testing, deploying, and monitoring services inside Docker Swarm clusters (The DevOps Toolkit Series) (Volume 2)
The DevOps 2.1 Toolkit: Docker Swarm: Building, testing, deploying, and monitoring services inside Docker Swarm clusters (The DevOps Toolkit Series) (Volume 2)

The book envelops all aspects of building, testing, deploying, and monitoring services inside Docker Swarm clusters. We'll go through all the tools required for running a cluster. We'll go through the whole process with clusters running locally on a laptop. Once we are confident with the outcome, we'll translate the experience to...

Intelligent Paradigms for Assistive and Preventive Healthcare (Studies in Computational Intelligence)
Intelligent Paradigms for Assistive and Preventive Healthcare (Studies in Computational Intelligence)
This book presents some of the recent advances in assistive and preventive healthcare in intelligent environment. As the world is becoming increasingly aware of the needs of people with disabilities, researchers are finding new technologies and applications to assist disabled people in performing the everyday activities which able-bodied people...
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)

Why do people lie?

Do gender and personality differences affect how people lie?

How can lies be detected?

Detecting Lies and Deceit provides the most comprehensive review of deception to date. This revised edition provides an up-to-date...

unlimited object storage image
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy