Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Solar Energy: Systems, Challenges, and Opportunities (Energy, Environment, and Sustainability)
Solar Energy: Systems, Challenges, and Opportunities (Energy, Environment, and Sustainability)
This book covers challenges and opportunities related to solar-energy based systems. It covers a wide variety of topics related to solar energy, including  applications-based systems such as solar thermal systems that are focused on drying, desalination, space cooling, refrigeration, and processing; recent advances in solar cells (DSSC) and...
Inquisition in the Fourteenth Century: The Manuals of Bernard Gui and Nicholas Eymerich (Heresy and Inquisition in the Middle Ages)
Inquisition in the Fourteenth Century: The Manuals of Bernard Gui and Nicholas Eymerich (Heresy and Inquisition in the Middle Ages)
The Inquisition played a central role in European history. It moulded societies by enforcing religious and intellectual unity; it helped develop the judicial and police techniques which are the basis of those used today; and it helped lay the foundations for the persecution of witches. An understanding of the Inquisition is therefore...
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

BusinessObjects: The Complete Reference
BusinessObjects: The Complete Reference

Improve profitability and operations in your company by leveraging BusinessObjects with help from this comprehensive guidebook. Divided into three digestible sections, Business Objects: The Complete Reference will help you get fully acquainted with this sophisticated tool set, design and build a user-friendly interface, then reap...

A UML Pattern Language (Macmillan Technology Series)
A UML Pattern Language (Macmillan Technology Series)

This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called...

Learning SQL on SQL Server 2005
Learning SQL on SQL Server 2005

Anyone who interacts with today's modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for...

Mac OS X 10.4 Tiger : Visual QuickStart Guide
Mac OS X 10.4 Tiger : Visual QuickStart Guide
So you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will...
Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
unlimited object storage image
Result Page: 933 932 931 930 929 928 927 926 925 924 923 922 921 920 919 918 917 916 915 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy