Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

The concept of Smart Cities is accurately regarded as a potentially transformative power all over the world. Bustling metropolises infused with the right combination of the Internet of Things, artificial intelligence, big data, and blockchain promise to improve both our daily lives and larger structural operations at a city...

Essential GWT: Building for the Web with Google Web Toolkit 2 (Developer's Library)
Essential GWT: Building for the Web with Google Web Toolkit 2 (Developer's Library)

With Google Web Toolkit, Java developers can build sophisticated Rich Internet Applications (RIAs) and complete Web sites using the powerful IDEs and tools they already use. Now, with GWT 2, Google Web Toolkit has become even more useful. Essential GWT shows how to use this latest version of GWT to create production solutions...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Software Deployment, Updating, and Patching (Information Security)
Software Deployment, Updating, and Patching (Information Security)
Presenting valuable information for professionals involved in maintaining and securing Microsoft systems and applications, Software Deployment, Updating, and Patching provides the skills necessary to develop a comprehensive strategy for updating and securing Microsoft systems with the latest packs and patches. It demonstrates how...
Solaris 9 Security (Networking)
Solaris 9 Security (Networking)
Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...

BGP
BGP

This is a book about connecting to the Internet as reliably as possible. This means eliminating all single points of failure,including having just one Internet service provider (ISP). By multihoming to two or more ISPs,you can remain connected when either ISP (or your connection to them) experiences problems. However,there...

RESTful Java Web Services Security
RESTful Java Web Services Security

Secure your RESTful applications against common vulnerabilities

About This Book

  • Learn how to use, configure, and set up tools for applications that use RESTful web services to prevent misuse of resources
  • Get to know and fix the most common vulnerabilities of RESTful web services APIs
  • ...
The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy