Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
MCSE Training Kit: Designing Microsoft Windows 2000 Network Security
MCSE Training Kit: Designing Microsoft Windows 2000 Network Security

Welcome to the MCSE Training Kit—Designing Microsoft Windows 2000 Network Security. This kit prepares you to analyze an organization's business and technical requirements and design security for a Windows 2000 network. You will learn how to design security for all aspects of Windows 2000, from authentication strategies to...

SAP Project Management Pitfalls: How to Avoid the Most Common Pitfalls of an SAP Solution
SAP Project Management Pitfalls: How to Avoid the Most Common Pitfalls of an SAP Solution

Master the SAP product ecosystem, the client environment, and the feasibility of implementing critical business process with the required technical and functional configuration. SAP Project Management Pitfalls is the first book to provide you with real examples of the pitfalls that you can avoid, providing you with a road-map to a...

Big Data Analytics with Microsoft HDInsight in 24 Hours, Sams Teach Yourself
Big Data Analytics with Microsoft HDInsight in 24 Hours, Sams Teach Yourself

With Microsoft HDInsight, business professionals and data analysts can rapidly leverage the power of Hadoop on a flexible, scalable cloud-based platform, using Microsoft's accessible business intelligence, visualization, and productivity tools. Now, in just 24 lessons of one hour or less, you can learn all the skills and...

Developing Virtual Reality Applications: Foundations of Effective Design
Developing Virtual Reality Applications: Foundations of Effective Design
This book, Developing Virtual Reality Applications: Foundations of Effective Design, has been many years in the making. Our interest in virtual reality came about as an outgrowth of our interest in, and our day-to-day work in scientific visualization. In the early 1990s the state-of-the-art in computer graphics used for scientific visualization was...
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)

Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and...

The Subtle Art of Strategy: Organizational Planning in Uncertain Times
The Subtle Art of Strategy: Organizational Planning in Uncertain Times
"Before Jack Welch there was Ian Wilson. In his years at GE, Wilson pioneered the concept that strategists must learn to plan in the face of uncertainty....In this brilliant volume he summarizes the strategic state-of-the-art in terms that are as clear as they are practical. Nobody has said it better." - James O'Toole University of...
Project 2010 For Dummies
Project 2010 For Dummies

Project management probably started back when a few cave dwellers got together and figured out how to work as a team to bag a wooly mammoth for their Sunday dinner. Some fellow — I’ll call him Ogg — probably took the lead as the very first project manager. He drew things in the dirt with a stick to help his team members...

Optimizing and Troubleshooting Hyper-V Storage
Optimizing and Troubleshooting Hyper-V Storage

This scenario-focused title provides concise technical guidance and insights for troubleshooting and optimizing storage with Hyper-V. Written by experienced virtualization professionals, this little book packs a lot of value into a few pages, offering a lean read with lots of real-world insights and best practices for Hyper-V storage...

Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Knowledge Management Systems: Information and Communication Technologies for Knowledge Management
Knowledge Management Systems: Information and Communication Technologies for Knowledge Management
The transformation of organizations into knowledge-intensive and knowledgeaware organizations takes place at an ever-increasing pace. Knowledge as the key resource, not labor, raw material or capital, changes production functions in organizations significantly. Knowledge represents the key concept to explain the increasing velocity of the...
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy