Home | Amazing | Today | Tags | Publishers | Years | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Using Docker: Developing and Deploying Software with Containers
Using Docker: Developing and Deploying Software with Containers

Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development...

Mastering Embedded Linux Programming
Mastering Embedded Linux Programming

Key Features

  • Create efficient and secure embedded devices using Linux
  • Minimize project costs by using open source tools and programs
  • Explore each component technology in depth, using sample implementations as a guide

Book Description

Mastering Embedded Linux...

Mastering Docker
Mastering Docker

Rethink what's possible with Docker – become an expert in the innovative containerization tool to unlock new opportunities in the way you use and deploy software

About This Book

  • Create highly scalable applications and services using the Linux container virtualization paradigm
  • ...
PostgreSQL Administration Cookbook, 9.5/9.6 Edition
PostgreSQL Administration Cookbook, 9.5/9.6 Edition

Over 150 recipes to help you administer your PostgreSQL database more efficiently

About This Book

  • Get to grips with the capabilities of PostgreSQL 9.6 to administer your database more efficiently
  • Monitor, tune, secure and protect your database
  • A step-by-step, recipe-based...
Stack Silver Get Gold: How To Buy Gold And Silver Bullion Without Getting Ripped Off!
Stack Silver Get Gold: How To Buy Gold And Silver Bullion Without Getting Ripped Off!

Want to learn how to start safely buying gold and silver bullion like a precious metals expert in about an hour?
 

This 2017 updated edition of Stack Silver Get Gold is the only gold and silver investing book you'll ever need because its written by a nationally recognized precious metals...

Rainbow Connections of Graphs (SpringerBriefs in Mathematics)
Rainbow Connections of Graphs (SpringerBriefs in Mathematics)

Rainbow connections are natural combinatorial measures that are used in applications to secure the transfer of classified information between agencies in communication networks. Rainbow Connections of Graphs covers this new and emerging topic in graph theory and brings together a majority of the results that deal with the...

Algebraic Shift Register Sequences
Algebraic Shift Register Sequences

Pseudo-random sequences are essential ingredients of every modern digital communication system including cellular telephones, GPS, secure internet transactions and satellite imagery. Each application requires pseudo-random sequences with specific statistical properties. This book describes the design, mathematical analysis and implementation...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Business Continuity and Disaster Recovery Planning for IT Professionals, Second Edition
Business Continuity and Disaster Recovery Planning for IT Professionals, Second Edition

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The...

Building Mobile Applications Using Kendo UI Mobile and ASP.NET Web API
Building Mobile Applications Using Kendo UI Mobile and ASP.NET Web API

Confident of your web application skills but not yet au fait with mobile development? Well this book helps you use the Kendo UI for a painless introduction. Practical tasks and clear instructions make learning a breeze.

Overview

  • Learn the basics of developing mobile applications using HTML5 and create an...
Result Page: 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy