Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCNP Security Secure 642-637 Official Cert Guide
CCNP Security Secure 642-637 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Advanced Oxidation Technologies: Sustainable Solutions for Environmental Treatments (Sustainable Energy Developments)
Advanced Oxidation Technologies: Sustainable Solutions for Environmental Treatments (Sustainable Energy Developments)

Advanced Oxidation Technologies (AOTs) or Processes (AOPs) are relatively new and innovative technologies to remove harmful and toxic pollutants. The most important processes among them are those using light, such as UVC/H2O2, photo-Fenton and heterogeneous photocatalysis with TiO2. These technologies are also relatively low-cost and...

The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors, Third Edition
The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors, Third Edition

This new edition has been fully revised and updated to include extensive information on the ARM Cortex-M4 processor, providing a complete up-to-date guide to both Cortex-M3 and Cortex-M4 processors, and which enables migration from various processor architectures to the exciting world of the Cortex-M3 and M4.

This book presents the...

Windows 8 For Dummies
Windows 8 For Dummies

The bestselling tech book of all time, now updated for Windows 8

Microsoft Windows is the operating system that runs nearly 90 percent of the world's computers. Windows 8 will offer new interface updates, cloud-based services, and much more. This update of Andy Rathbone's bestselling Windows guide covers all the...

Hydraulic Fracturing Chemicals and Fluids Technology
Hydraulic Fracturing Chemicals and Fluids Technology

When classifying fracturing fluids and their additives, it is important that production, operation, and completion engineers understand which chemical should be utilized in different well environments. A user's guide to the many chemicals and chemical additives used in hydraulic fracturing operations, Hydraulic Fracturing Chemicals and...

Cold-adapted Yeasts: Biodiversity, Adaptation Strategies and Biotechnological Significance
Cold-adapted Yeasts: Biodiversity, Adaptation Strategies and Biotechnological Significance

Yeasts are a versatile group of eukaryotic microorganisms, exhibiting heterogeneous nutritional profiles and an extraordinary ability to survive in a wide range of natural and man-associated ecosystems, including cold habitats. Cold-adapted yeasts inhabit numerous low-temperature environments where they are subjected to seasonal or permanent...

Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking

This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...

Office 365: Migrating and Managing Your Business in the Cloud
Office 365: Migrating and Managing Your Business in the Cloud

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Inbound Marketing: Get Found Using Google, Social Media, and Blogs
Inbound Marketing: Get Found Using Google, Social Media, and Blogs

Stop pushing your message out and start pulling your customers in

Traditional "outbound" marketing methods like cold-calling, email blasts, advertising, and direct mail are increasingly less effective. People are getting better at blocking these interruptions out using Caller ID, spam protection, TiVo,
...

Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy