Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
Security and Privacy in Biometrics
Security and Privacy in Biometrics

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and...

Learning Nagios 4
Learning Nagios 4

Learn how to set up Nagios 4 in order to monitor your systems efficiently About This Book Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Resilience Assessment and Evaluation of Computing Systems
Resilience Assessment and Evaluation of Computing Systems

The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of...

Android Security Internals: An In-Depth Guide to Android's Security Architecture
Android Security Internals: An In-Depth Guide to Android's Security Architecture

"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf."—Jon "jcase" Sawyer, from the Foreword

...
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the...

Network and System Security, Second Edition
Network and System Security, Second Edition

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of...

Instant Moodle Quiz Module How-to
Instant Moodle Quiz Module How-to

Create Moodle quizzes to enhance learning using practical, hands-on recipes

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Create a well categorized question bank to provide the foundation for quizzes.
  • Provide extensive...
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Nginx: From Beginner to Pro
Nginx: From Beginner to Pro

Teaches you to start up Nginx and quickly take your expertise to a level where you can comfortably work with various aspects of the web server and make informed design decisions for your web farm. Nginx powers more than 40% of the top 1000 websites and is among the handful of web servers that can handle more than 10K simultaneous connections....

Java EE 7 with GlassFish 4 Application Server
Java EE 7 with GlassFish 4 Application Server

A practical guide to install and configure the GlassFish 4 application server and develop Java EE 7 applications to be deployed to this server

About This Book

  • Install and configure GlassFish 4
  • Covers all major Java EE 7 APIs and includes new additions such as JSON Processing
  • ...
Result Page: 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy