Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

Hacking Raspberry Pi
Hacking Raspberry Pi

 

DIY hardware hacking...easy as Pi ®!

Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful...

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

An Introduction to R
An Introduction to R

This tutorial manual provides a comprehensive introduction to R, a software package for statistical computing and graphics. R supports a wide range of statistical techniques and is easily extensible via user-defined functions. One of R's strengths is the ease with which publication-quality plots can be produced in a wide variety of...

CompTIA Network+ Practice Tests: Exam N10-007
CompTIA Network+ Practice Tests: Exam N10-007

A smarter, faster review for the CompTIA Network+ exam N10-007

Expertly authored questions provide comprehensive, concise review of 100% of all CompTIA Network+ exam objectives. This certification validates skills equivalent to nine months of practical networking experience; those earning the Network+ certificate will
...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications, and Emerging Technologies

Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...

Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Result Page: 353 352 351 350 349 348 347 346 345 344 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy