Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Beginning BlackBerry 7 Development
Beginning BlackBerry 7 Development

Are you interested in creating BlackBerry apps using the latest BlackBerry 7 and BlackBerry Java Plug-in for Eclipse? Then this is the book for you. Beginning BlackBerry 7 Development offers a hands-on approach to learning how to build and deploy sophisticated BlackBerry apps using the latest tools...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)
Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)

Information propagation through peer-to-peer systems, online social systems, wireless mobile ad hoc networks and other modern structures can be modelled as an epidemic on a network of contacts. Understanding how epidemic processes interact with network topology allows us to predict ultimate course, understand phase transitions and develop...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Windows 10 Anniversary Update Bible
Windows 10 Anniversary Update Bible

Your all-inclusive guide to Windows 10 Anniversary Edition

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS....

Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

Effective Enterprise Java
Effective Enterprise Java

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network

    ...
Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

unlimited object storage image
Result Page: 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy