 Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.
You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more... |  |  |  |  Programming Persistent Memory: A Comprehensive Guide for Developers
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times?a huge leap forward in byte-addressable... |