Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Java EE 7 Development with WildFly
Java EE 7 Development with WildFly

Leverage the power of the WildFly application server from JBoss to develop modern Java EE 7 applications

About This Book

  • Develop Java EE 7 applications using the WildFly platform
  • Discover how to manage your WildFly production environment
  • A step-by-step tutorial guide to...
Apache CloudStack Cloud Computing
Apache CloudStack Cloud Computing

Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.

Overview

  • Install, deploy, and manage a cloud service using...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Home Networking Do-It-Yourself For Dummies
Home Networking Do-It-Yourself For Dummies

Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!

Think about it: Your televisions are basically networked together on a cable network. Okay, not a...

New Directions of Modern Cryptography
New Directions of Modern Cryptography

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...

VMware vCloud Director Cookbook
VMware vCloud Director Cookbook

Over 80 recipes to help you master VMware vCloud Director

Overview

  • Learn how to work with the vCloud API
  • Covers the recently launched VMware vCloud Suite 5.5
  • Step-by-step instructions to simplify infrastructure provisioning
  • Real-life implementation of tested...
Oracle Data Integrator 11g Cookbook
Oracle Data Integrator 11g Cookbook

This book is all you need to take your understanding of Oracle Data Integrator to the next level. From initial deployment right through to esoteric techniques, the task-based approach will enhance your expertise effortlessly.

Overview

  • Clear, step-by-step recipes to walk you through some of the most...
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Qmail Quickstarter: Install, Set Up and Run your own Email Server
Qmail Quickstarter: Install, Set Up and Run your own Email Server

A fast-paced and easy-to-follow, step-by-step guide that gets you up and running quickly

  • Qmail Basics
  • Storing and retrieving of emails
  • Virtualisation
  • Filtering Spam
  • Hosting Multiple Domains, Encryption, and Mailing Lists

In Detail

This book...

unlimited object storage image
Result Page: 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy