Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

UNIX and Linux System Administration Handbook (5th Edition)
UNIX and Linux System Administration Handbook (5th Edition)

UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.

 

...
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
DevOps with Kubernetes: Accelerating software delivery with container orchestrators
DevOps with Kubernetes: Accelerating software delivery with container orchestrators

Learn to implement DevOps using Docker & Kubernetes.

About This Book

  • Learning DevOps, container, and Kubernetes within one book.
  • Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently.
  • A practical guide towards container management and...
Spring REST
Spring REST

Spring REST is a practical guide for designing and developing RESTful APIs using the Spring Framework. This book walks you through the process of designing and building a REST application while taking a deep dive into design principles and best practices for versioning, security, documentation, error handling, paging, and...

Fundamentals of Digital Image Processing: A Practical Approach with Examples in Matlab
Fundamentals of Digital Image Processing: A Practical Approach with Examples in Matlab

This is an introductory to intermediate level text on the scienceof image processing, which employs the Matlab programming languageto illustrate some of the elementary, key concepts in modern imageprocessing and pattern recognition. The approach taken isessentially practical and the book offers a framework within whichthe concepts can be...

A History of Video Games in 64 Objects
A History of Video Games in 64 Objects

Inspired by the groundbreaking A History of the World in 100 Objects, this book draws on the unique collections of The Strong museum in Rochester, New York, to chronicle the evolution of video games, from Pong to first-person shooters, told through the stories of dozens of objects essential to the field’s creation and...

Data Mining for Bioinformatics
Data Mining for Bioinformatics

Covering theory, algorithms, and methodologies, as well as data mining technologies, Data Mining for Bioinformatics provides a comprehensive discussion of data-intensive computations used in data mining with applications in bioinformatics. It supplies a broad, yet in-depth, overview of the application domains of data mining...

Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)
Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)

Making Big Data Work: Real-World Use Cases and Examples, Practical Code, Detailed Solutions

 

Large-scale data analysis is now vitally important to virtually every business. Mobile and social technologies are generating massive datasets;...

Windows Azure Step by Step
Windows Azure Step by Step

Windows Azure is the Microsoft cloud computing platform that lets developers leverage its powerful, scalable, and fault-tolerant infrastructure to build successful applications.

Windows Azure Step by Step provides an organized walkthrough of the Windows Azure platform and its related technologies. The text is...

Result Page: 182 181 180 179 178 177 176 175 174 173 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy