Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Cloud Native Development Patterns and Best Practices: Practical architectural patterns for building modern, distributed cloud-native systems
Cloud Native Development Patterns and Best Practices: Practical architectural patterns for building modern, distributed cloud-native systems

Learn to apply cloud-native patterns and practices to deliver responsive, resilient and message-driven systems with confidence

Key Features

  • Understand the architectural patterns involved in cloud-native architectures
  • Minimize risk by evolving your monolithic applications...
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
PMP Certification All-in-One For Dummies
PMP Certification All-in-One For Dummies

This completely updated guide prepares you for taking the PMP certification exam

As the most popular project management certification available, the PMP certification is very difficult to obtain and demands stringent requirements. Thankfully, this All-in-One guide is packed with valuable information that has been completely...

Beginning Database Design: From Novice to Professional (Beginning Apress)
Beginning Database Design: From Novice to Professional (Beginning Apress)
Everyone keeps data. Big organizations spend millions to look after their payroll, customer, and transaction data. The penalties for getting it wrong are severe: businesses may collapse, shareholders and customers lose money, and for many organizations (airlines, health boards, energy companies), it is not exaggerating to say that...
PMP: Project Management Professional Exam Study Guide, Includes Audio CD
PMP: Project Management Professional Exam Study Guide, Includes Audio CD

Prepare for the Latest Project Management Professional Exam

Prepare for the latest Project Management Professional (PMP®) certification exam with this new edition of the PMP Study Guide, which covers all essential procedures and concepts from A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fourth Edition....

Testing Extreme Programming
Testing Extreme Programming

Testing Extreme Programming is a practical tutorial that gives software builders a lucid understanding of this important aspect of development. This book demonstrates how testing is central to the XP project, clearly spelling out what testing should be done and when and how it should be...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing
Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing

Adopt the investment strategy that built Warren Buffett's fortune

Invest Like a Guru provides an invaluable resource for high-quality-focused value investing, with expert insight and practical tools for implementation. Written by the man behind GuruFocus.com, this book expands on the site's value...

Misconceptions of Risk
Misconceptions of Risk

The risk discipline is young and there are a number of ideas, perspectives and conceptions of risk out there. A number of such common conceptions of risk are examined in the book, related to the risk concept, risk assessments, uncertainty analyses, risk perception, the precautionary principle, risk management and decision making under...

Result Page: 92 91 90 89 88 87 86 85 84 83 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy