Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
The Art of R Programming: A Tour of Statistical Software Design
The Art of R Programming: A Tour of Statistical Software Design

R is the world's most popular language for developing statistical software: Archaeologists use it to track the spread of ancient civilizations, drug companies use it to discover which medications are safe and effective, and actuaries use it to assess financial risks and keep economies running smoothly.

...

Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data is designed as a text for a one-semester or one-quarter course in survival analysis for upper-level or graduate students in statistics, biostatistics, and epidemiology. Prerequisites are a standard pre-calculus first course in probability and statistics, and a course in applied...
Practical Game Design: Learn the art of game design through applicable skills and cutting-edge insights
Practical Game Design: Learn the art of game design through applicable skills and cutting-edge insights

Design accessible and creative games across genres, platforms, and development realities

Key Features

  • Implement the skills and techniques required to work in a professional studio
  • Ace the core principles and processes of level design, world building, and storytelling
  • ...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Private Debt: Opportunities in Corporate Direct Lending (Wiley Finance)
Private Debt: Opportunities in Corporate Direct Lending (Wiley Finance)

The essential resource for navigating the growing direct loan market

Private Debt: Opportunities in Corporate Direct Lending provides investors with a single, comprehensive resource for understanding this asset class amidst an environment of tremendous growth. Traditionally a niche asset class pre-crisis,...

Transformation Processes of Metals in Urban Road Dust: Implications for Stormwater Reuse (SpringerBriefs in Water Science and Technology)
Transformation Processes of Metals in Urban Road Dust: Implications for Stormwater Reuse (SpringerBriefs in Water Science and Technology)
This book discusses the physicochemical changes (transformations) that metals deposited on urban road surfaces undergo during dry weather periods, in order to provide insights into their potential impacts on stormwater quality. Based on extensive field experiments, and laboratory and data analyses, it examines transformation characteristics of...
Human Geoscience (Advances in Geological Science)
Human Geoscience (Advances in Geological Science)
This book is a product of the joint efforts of interdisciplinary academic fields under the integrative framework of human geoscience. Human geoscience is a new genre of geoscience concerned with the natural phenomena that occur on the surface of the Earth and their relations with human activities. It therefore has connections with many...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy