Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Get a 360-degree view of digital project management. Learn proven best practices from case studies and real-world scenarios. A variety of project management tools, templates, models, and frameworks are covered.

This book provides an in-depth view of digital project management from initiation to execution to monitoring and
...
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Gain all the essentials you need to create scalable microservices, which will help you solve real challenges when deploying services into production. This book will take you through creating a scalable data layer with polygot persistence. You’ll cover data access and query patterns in Spring and JPA in high-performance...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Mathematics of Shape Description: A Morphological Approach to Image Processing and Computer Graphics
Mathematics of Shape Description: A Morphological Approach to Image Processing and Computer Graphics
Image processing problems are often not well defined because real images are contaminated with noise and other uncertain factors. In Mathematics of Shape Description, the authors take a mathematical approach to address these problems using the morphological and set-theoretic approach to image processing and computer graphics by presenting...
Mastering JavaScript Design Patterns - Second Edition
Mastering JavaScript Design Patterns - Second Edition

Key Features

  • Learn how to use tried and true software design methodologies to enhance your JavaScript code
  • Discover robust JavaScript implementations of classic and advanced design patterns
  • Packed with easy-to-follow examples that can be used to create reusable code and...
Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Smarter Homes: How Technology Will Change Your Home Life (Design Thinking)
Smarter Homes: How Technology Will Change Your Home Life (Design Thinking)
Examine the history of smart homes, how technology shapes our lives, and ways you can think about the home when developing new products. This book presents the opportunities in the homespace that will come from understanding the history and multiple players that have contributed to the development of the home in general. ...
Effective Team Management with VSTS and TFS: A Guide for Scrum Masters
Effective Team Management with VSTS and TFS: A Guide for Scrum Masters
Gain the essential knowledge to use VSTS/TFS effectively to empower your Agile teams. This book provides a deep analysis into issues Agile teams may face and how to overcome them by adopting and implementing the proper tools.

Rather than just review VSTS/TFS features, this book provides proven solutions
...
Result Page: 71 70 69 68 67 66 65 64 63 62 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy