Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Ontology Engineering in Cloud Services, Networks and Management Systems
Applied Ontology Engineering in Cloud Services, Networks and Management Systems

Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow

Implement state-of-the-art deep reinforcement learning algorithms using Python and its powerful libraries

Key Features

  • Implement Q-learning and Markov models with Python and OpenAI
  • Explore the power of TensorFlow to build self-learning models
  • Eight AI...
Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

Sensor Technology Handbook
Sensor Technology Handbook
The first decade of the 21st century has been labeled by some as the “Sensor Decade.”
With a dramatic increase in sensor R&D and applications over the past 15 years, sensors
are certainly poised on the brink of a revolution similar to that experienced in
microcomputers in the 1980s. Just in automobiles alone, sensing
...
Optical Switching  and Networking Handbook
Optical Switching and Networking Handbook
Before you begin to read this book, please take a moment to read these introductory comments. The title of the book may be misleading for many people:

For the engineering person, this may sound like the bible of optical networks and switching systems. Not so! This is not an engineering book and will not dig into the gory details of bits
...
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
WordPress MU 2.8: Beginner's Guide
WordPress MU 2.8: Beginner's Guide
WordPress MU enables you to build a complete, professional blog network. Each user gets their own blog, and can choose their favorite templates and plug-ins, and develop their own content. WordPress MU powers some of the largest blog networks in the world, including the mighty WordPress.com - home to thousands of bloggers.

This book will
...
Anarchy Alive!: Anti-Authoritarian Politics from Practice to Theory
Anarchy Alive!: Anti-Authoritarian Politics from Practice to Theory
Anarchist politics are at the heart of today’s most vibrant and radical social movements. From squatted social centres and community gardens to acts of sabotage and raucous summit blockades, anarchist groups and networks are spreading an ethos of direct action, non-hierarchical organizing and self-liberation that has redefined...
unlimited object storage image
Result Page: 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy