Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Street-Fighting Mathematics: The Art of Educated Guessing and Opportunistic Problem Solving (The MIT Press)
Street-Fighting Mathematics: The Art of Educated Guessing and Opportunistic Problem Solving (The MIT Press)
Too much mathematical rigor teaches rigor mortis: the fear of making an unjustified leap even when it lands on a correct result. Instead of paralysis, have courage—shoot first and ask questions later. Although unwise as public policy, it is a valuable problem-solving philosophy, and it is the theme of this book: how to...
Developments in the Theory and Practice of Cybercartography, Volume 5: Applications and Indigenous Mapping (Modern Cartography Series)
Developments in the Theory and Practice of Cybercartography, Volume 5: Applications and Indigenous Mapping (Modern Cartography Series)

Developments in the Theory and Practice of Cybercartography―awarded an Honorable Mention in Earth Science at the Association of American Publishers' 2015 PROSE Awards―examines some of the recent developments in the theory and practice of cybercartography and the substantial changes which have taken place since the first...

Apache CloudStack Cloud Computing
Apache CloudStack Cloud Computing

Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.

Overview

  • Install, deploy, and manage a cloud service using...
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Hybrid Cloud Management with Red Hat CloudForms
Hybrid Cloud Management with Red Hat CloudForms

Build, manage, and control an open hybrid cloud infrastructure using Red Hat CloudForms

About This Book

  • Understand the infrastructure management capabilities through monitoring and tracking techniques
  • Control the hybrid cloud infrastructure using policies and define actions based on...
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

Managing Mission-Critical Domains and DNS
Managing Mission-Critical Domains and DNS

Manage your organization’s naming architecture effectively, from the administrative/policy side right through to the technical DNS and nameserver implementations. This practical book takes you through the basics—the anatomies of domain names and DNS requests—and covers DNS and domain issues from a variety of...

The Industrial Organization of Banking: Bank Behavior, Market Structure, and Regulation
The Industrial Organization of Banking: Bank Behavior, Market Structure, and Regulation

The academic literature commonly examines issues relating to bank behavior, market structure, or bank regulation by abstracting from interrelationships among these factors. From a policy perspective, however, these elements of the industrial organization of banking are inextricably linked. The goal of this book is to provide a complete overview,...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

Regulation and the Evolution of the Global Telecommunications Industry
Regulation and the Evolution of the Global Telecommunications Industry

After decades of liberalization of the telecommunications industry around the world and technological convergence that allows for increasing competition, sector-specific regulation of telecommunications has been on the decline. As a result, the telecommunications industry stands in the middle of a debate that calls for either a total...

Result Page: 68 67 66 65 64 63 62 61 60 59 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy