Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
5G-Enabled Vehicular Communications and Networking (Wireless Networks)
5G-Enabled Vehicular Communications and Networking (Wireless Networks)

This book investigates and reviews recent advanced techniques and important applications in vehicular communications and networking (VCN) from a novel perspective of the combination and integration of VCN and connected vehicles, which provides a significant scientific and technical support for future 5G-based...

Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Ambient intelligence (AmI) is an element of pervasive computing that brings smartness to living and business environments to make them more sensitive, adaptive, autonomous and personalized to human needs. It refers to intelligent interfaces that recognise human presence and preferences, and adjust smart environments to suit their...
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

Computational Methods for Deep Learning: Theoretic, Practice and Applications (Texts in Computer Science)
Computational Methods for Deep Learning: Theoretic, Practice and Applications (Texts in Computer Science)

Integrating concepts from deep learning, machine learning, and artificial neural networks, this highly unique textbook presents content progressively from easy to more complex, orienting its content about knowledge transfer from the viewpoint of machine intelligence. It adopts the methodology from graphical theory, mathematical...

PowerShell in Depth: An administrator's guide
PowerShell in Depth: An administrator's guide

Summary

PowerShell in Depth is the kind of book you'll want open on your desk most of the time. With 40 short chapters, each focused on a specific area of PowerShell, you'll be able to find the answers you need quickly. Each chapter is concise and to-the-point, so you can spend less time reading and...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

unlimited object storage image
Result Page: 385 384 383 382 381 380 379 378 377 376 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy