The Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation...
Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.
Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...
A general scenario that has attracted a lot of attention for multimedia information retrieval is based on the query-by-example paradigm: retrieve all documents from a database containing parts or aspects similar to a given data fragment. However, multimedia objects, even though they are similar from a structural or semantic viewpoint, often reveal...
Although there are many how-to books on negotiating, they provide little useful guidance on how to conduct complex realworld negotiations. Advice on conducting two-party negotiations about a modest number of issues isn’t hard to come by, but few negotiations are that simple. While dealing with the other side, negotiators typically also...
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...
Vascular Surgery: Cases, Questions and Commentaries second edition is a unique collection of real life case histories written by experts to highlight the diversity of problems encountered in vascular surgery.
Each case scenario is interspersed with questions that aim to engage the readers to the management of the patient...
DevOps has become a major topic for developers, testers, project managers and many others involved in building software products. Microsoft has introduced Azure DevOps as their tool for implementing DevOps practices.
This book is intended to provide the reader a step-by-step, easy to follow guide...
Plan, Manage, and Architect Multiple Web Sites for Maximum Efficiency and Business Value
For many companies, one Web site is no longer enough. Business strategy requires multiple Web sites, each with carefully targeted audiences and marketing...
CCNA Exam Certification Guide is a comprehensive study tool for CCNA Exam #640-407. Written by a CCIE and Certified Cisco Systems Instructor and reviewed by Cisco technical experts, CCNA Exam Certification Guide helps you understand and master the exam objectives. Section-by-section objective lists keep you focused on the material...