Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Grinnell: America's Environmental Pioneer and His Restless Drive to Save the West
Grinnell: America's Environmental Pioneer and His Restless Drive to Save the West

Winner • National Outdoor Book Award (History/Biography)
Longlisted • PEN/Jacqueline Bograd Weld Award for Biography

Before Rachel Carson, there was George Bird Grinnell?the man whose prophetic vision did nothing less than launch American conservation.

George
...
Nanomaterials and Plant Potential
Nanomaterials and Plant Potential

This book discusses the latest developments in plant-mediated fabrication of metal and metal-oxide nanoparticles, and their characterization by using a variety of modern techniques. It explores in detail the application of nanoparticles in drug delivery, cancer treatment, catalysis, and as antimicrobial agent, antioxidant and the...

Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Get started and learn a step-by-step approach to application development using Microsoft Azure. Select the right services to solve the problem at hand in a cost-effective manner and explore the potential different services and how they can help in building enterprise applications.

Azure has an ample amount of
...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

The Definitive Guide to the ARM Cortex-M3
The Definitive Guide to the ARM Cortex-M3
This user's guide does far more than simply outline the ARM Cortex-M3 CPU features; it explains step-by-step how to program and implement the processor in real-world designs. It teaches readers how to utilize the complete and thumb instruction sets in order to obtain the best functionality, efficiency, and reuseability. The author, an ARM engineer...
Data Storage Networking: Real World Skills for the CompTIA Storage+ Certification and Beyond
Data Storage Networking: Real World Skills for the CompTIA Storage+ Certification and Beyond

Learn efficient ways to harness and manage your data storage networks

Whether you're preparing for the CompTIA Storage+ exam or simply seeking a deeper understanding of data storage networks, this Sybex guide will help you get there. This book covers data storage from the basics to advanced topics, and provides practical...

Result Page: 47 46 45 44 43 42 41 40 39 38 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy