Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Encyclopedia of Information Science and Technology, Fourth Edition
Encyclopedia of Information Science and Technology, Fourth Edition

In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Structural Geology Algorithms: Vectors and Tensors
Structural Geology Algorithms: Vectors and Tensors

State-of-the-art analysis of geological structures has become increasingly quantitative but traditionally, graphical methods are used in teaching. This innovative lab book provides a unified methodology for problem-solving in structural geology using linear algebra and computation. Assuming only limited mathematical training, the book begins...

IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
Windows 10 Anniversary Update Bible
Windows 10 Anniversary Update Bible

Your all-inclusive guide to Windows 10 Anniversary Edition

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS....

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Introduction to Algorithms, Third Edition (International Edition)
Introduction to Algorithms, Third Edition (International Edition)

A new edition of the essential text and professional reference, with substantial new material on such topics as vEB trees, multithreaded algorithms, dynamic programming, and edge-based flow.

Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Daniel Arbuckle's Mastering Python
Daniel Arbuckle's Mastering Python

Key Features

  • Covers the latest and advanced concepts of Python such as parallel processing with Python 3.6
  • Explore the Python language from its basic installation and setup to concepts such as reactive programming and microservices
  • Get introduced to the mechanism for rewriting code in a...
Result Page: 390 389 388 387 386 385 384 383 382 381 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy