Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Nuclear Engineering Handbook (Mechanical Engineering)
Nuclear Engineering Handbook (Mechanical Engineering)

Nuclear power has, in recent years, undergone a major transformation, resulting in major technical developments and a new generation of nuclear scientists and engineers. A comprehensive book that reflects the latest nuclear technologies has been lacking—until now.

The Nuclear Engineering Handbook is a response to...

Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Real Options Analysis Course : Business Cases and Software Applications
Real Options Analysis Course : Business Cases and Software Applications
Praise for Real Options Analysis Course

"Dr. Mun’s latest book is a logical extension of the theory and application presented in Real Options Analysis. More specifically, the Real Options Analysis Course presents numerous real options examples and provides the reader with step-by-step problem-solving techniques. After having read the...

Introducing Windows Server 2008
Introducing Windows Server 2008

Your first look at the next generation of Windows Server-straight from the experts.

Get a jump on evaluating Windows Server 2008-with technical insights direct from the Windows Server team. This practical introduction delivers real-world implementation scenarios and pragmatic advice for administering Windows Server in the enterprise.

...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Oracle Data Guard 11g Handbook (Osborne ORACLE Press Series)
Oracle Data Guard 11g Handbook (Osborne ORACLE Press Series)

Provide superior data protection, availability, and disaster recovery using the tested techniques in this Oracle Press guide. Cowritten by a team of Oracle experts, Oracle Data Guard 11g Handbook provides a sound architectural foundation along with best practices for configuration, monitoring, maintenance, and troubleshooting. You...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
From Good to Bad Bankers: Lessons Learned from a 50-Year Career in Banking
From Good to Bad Bankers: Lessons Learned from a 50-Year Career in Banking

Bankers are administrators of other people’s money, and they are responsible both to their depositors and to other stakeholders.  Human nature being what it is, however, they sometimes fall prey to overweening ambition, coming to see themselves as the rightful beneficiaries of the moneys entrusted to them.  This can...

unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy