Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Cassandra for Administrators
Learning Cassandra for Administrators

Understand the immense capabilities of Cassandra in managing large amounts of data and learn how to ensure that data is always available. This practical, hands-on guide takes you through every stage from installation to performance tuning.

Overview

  • Install and set up a multi datacenter Cassandra
  • ...
iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network...

The Modern C++ Challenge: Become an expert programmer by solving real-world problems
The Modern C++ Challenge: Become an expert programmer by solving real-world problems

Test your C++ programming skills by solving real-world programming problems covered in the book

Key Features

  • Solve a variety of real-world programming and logic problems by leveraging the power of C++17
  • Test your skills in using language features, algorithms, data...
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)
This book explains how to build a Virtual Private Network (VPN), a collection of
technologies that creates secure collections or "tunnels" over regular Internet lines. It
discusses costs, configuration, and how to install and use technologies that are available for
Windows NT and UNIX, such as PPTP and L2TP, Altavista
...
CCSP: Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541)
CCSP: Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541)
This Study Guide is an introduction to the Cisco Certified Security Professional (CCSP) certification
track. It will help improve your Cisco security skills so that you can have more
opportunities for a better job or job security. Security experience has been the buzzword and
it will continue to be because networks need security....
Integrity and Internal Control in Information Systems VI
Integrity and Internal Control in Information Systems VI
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions:
  • what precisely do business managers need...
Using the Internet Safely For Seniors For Dummies (Computer/Tech)
Using the Internet Safely For Seniors For Dummies (Computer/Tech)
The Internet is amazing, but the risks you’ve heard about are real, too. You can avoid being a victim of online crime with the simple steps for staying safe online that you’ll find in Using the Internet Safely For Seniors For Dummies.

Here’s the guide you need to steer safely through the hazards so you can shop,...

Learn Linux in a Month of Lunches
Learn Linux in a Month of Lunches

Summary

Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801), Fourth Edition
CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801), Fourth Edition
This Study Guide is an introduction to the Cisco Certified Security Professional (CCSP) certification
track. It will help improve your Cisco security skills so that you can have more
opportunities for a better job or job security. Security experience has been the buzzword and
it will continue to be because networks need security....
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

unlimited object storage image
Result Page: 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy