Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Practical Game Design: Learn the art of game design through applicable skills and cutting-edge insights
Practical Game Design: Learn the art of game design through applicable skills and cutting-edge insights

Design accessible and creative games across genres, platforms, and development realities

Key Features

  • Implement the skills and techniques required to work in a professional studio
  • Ace the core principles and processes of level design, world building, and storytelling
  • ...
Programming Google App Engine
Programming Google App Engine
On the Internet, popularity is swift and fleeting. A mention of your website on a popular blog can bring 300,000 potential customers your way at once, all expecting to find out who you are and what you have to offer. But if you’re a small company just starting out, your hardware and software aren’t...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Private Debt: Opportunities in Corporate Direct Lending (Wiley Finance)
Private Debt: Opportunities in Corporate Direct Lending (Wiley Finance)

The essential resource for navigating the growing direct loan market

Private Debt: Opportunities in Corporate Direct Lending provides investors with a single, comprehensive resource for understanding this asset class amidst an environment of tremendous growth. Traditionally a niche asset class pre-crisis,...

Keeping Your AI Under Control: A Pragmatic Guide to Identifying, Evaluating, and Quantifying Risks
Keeping Your AI Under Control: A Pragmatic Guide to Identifying, Evaluating, and Quantifying Risks
Artificial Intelligence (AI), we often see it as a panacea that can somehow resolve everything. As it stands today, the outlook is still highly debatable. AI has now become a real-world application technology, and it is becoming part of modern life fabric.

If AI is to drive the business success and social acceptance, it
...
PBX Systems for IP Telephony
PBX Systems for IP Telephony
The most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates...
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy