Home | Amazing | Today | Tags | Publishers | Years | Search 
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Domain Engineering: Product Lines, Languages, and Conceptual Models
Domain Engineering: Product Lines, Languages, and Conceptual Models

Domain engineering is a set of activities intended to develop, maintain, and manage the creation and evolution of an area of knowledge suitable for processing by a range of software systems.  It is of considerable practical significance, as it provides methods and techniques that help reduce time-to-market, development costs, and...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
Basic Guide to System Safety
Basic Guide to System Safety

This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery,...

The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios
The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios

The definitive reference book with real-world solutions you won't find anywhere else

The Big Book of Dashboards presents a comprehensive reference for those tasked with building or overseeing the development of business dashboards.

Comprising dozens of examples that address different industries...

Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing
Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing

Adopt the investment strategy that built Warren Buffett's fortune

Invest Like a Guru provides an invaluable resource for high-quality-focused value investing, with expert insight and practical tools for implementation. Written by the man behind GuruFocus.com, this book expands on the site's value...

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Project Management For Dummies
Project Management For Dummies

The tools you need for successful project management

In today's time-crunched, cost-conscious global business environment, tight project deadlines and stringent expectations are the norm. Now with 25% new and updated content, Project Management For Dummies, 3rd Edition introduces you to the principles of...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy