Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection in Wireless Ad-Hoc Networks

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...

Learn Windows IIS in a Month of Lunches
Learn Windows IIS in a Month of Lunches

Summary

Learn Windows IIS in a Month of Lunches is an innovative tutorial designed for busy administrators. Even if you have no prior exposure to IIS, you can follow the crisp explanations, examples, and exercises in this concise, easy-to-read book. Just set aside one hour a day—lunchtime would be...

WordPress Top Plugins
WordPress Top Plugins

WordPress has thousands of plugins available—most of them don't work as advertised, are out dated, or simply don't work. Wordpress Top Plugins takes you through the process of finding the very best plugins to build a powerful and engaging website or blog.

With access to over 10,000 plugins, finding the ones that...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Building Microservices with Go
Building Microservices with Go

Key Features

  • This short, concise, and practical guide is packed with real-world examples of building microservices with Go
  • It is easy to read and will benefit smaller teams who want to extend the functionality of their existing systems
  • Using this practical approach will save your money in...
MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)
MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)

The study guide helps you master all the topics on the MCSA 70-410 exam, including the following:

  • Installing and configuring Windows Server 2012
  • Configuring storage, shares, and permissions
  • ...
Developments in Tissue Engineered and Regenerative Medicine Products: A Practical Approach (Woodhead Publishing Series in Biomaterials)
Developments in Tissue Engineered and Regenerative Medicine Products: A Practical Approach (Woodhead Publishing Series in Biomaterials)

Developments in tissue engineered and regenerative medicine products summarizes recent developments in tissue engineering and regenerative medicine with an emphasis on commercialization and product development. Features of current cell therapy and tissue engineered products which have facilitated successful commercialization are emphasized...

Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
As the only book to address ASP.NET 3.5, AJAX, and IIS 7 security from the developer’s point of view, this book begins with a look at the new features of IIS 7.0 and then goes on to focus on IIS 7.0 and ASP.NET 3.5 integration. You’ll walk through a detailed explanation of the request life cycle for an ASP.NET application running on IIS...
Securing PHP Web Applications
Securing PHP Web Applications
If you’re reading this, we know two things about you: First, you write PHP applications that run online. Second, you’re not a hard-core security guru. In fact, you’re probably holding this book right now because other security books left you with more questions than you started with, or because this is the first time you’ve...
Pro SQL Database for Windows Azure: SQL Server in the Cloud
Pro SQL Database for Windows Azure: SQL Server in the Cloud

Pro SQL Database for Windows Azure, 2nd Edition shows how to create enterprise-level database deployments without the usual investment in datacenter and other infrastructure. Take advantage instead of Microsoft’s worldwide backbone for cloud computing that delivers all the power of SQL Server in the form of the cloud-based...

The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects
The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects

Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, EOS and Hyperledger.  

This book helps you understand Blockchain beyond development and crypto to better harness its power and capability. You will learn...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy