Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Chronic Total Occlusions: A Guide to Recanalization
Chronic Total Occlusions: A Guide to Recanalization

""Chronic total occlusions continue to represent one of the greatest challenges to interventional cardiologists."" - Cardiovascular Research Foundation - Chronic Total Occlusions or CTOs can be found in 30% of patients with coronary artery disease. Despite advances, CTOs remain one of the most frequently identified lesions...

Atmospheric Deposition: In Relation to Acidification and Eutrophication (Studies in Environmental Science)
Atmospheric Deposition: In Relation to Acidification and Eutrophication (Studies in Environmental Science)
In the early 1980s, the problem of acidification was acknowledged on a governmental level in the Netherlands as posing a major environmental threat. The concern for damage to forests and ecosystems, and materials and monuments, as well as for acidification of soils and moorland pools stimulated research and policy development. Acid...
Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
Starting and Managing a Nonprofit Organization: A Legal Guide
Starting and Managing a Nonprofit Organization: A Legal Guide

Nuts-and-bolts guidance on the laws, rules, and regulations governing the nonprofit sector—from leading nonprofit law expert, Bruce R. Hopkins

Nonprofits must comply with stringent federal and state laws due to their special tax-exempt status; the government's ultimate threat is revocation of a nonprofit's...

Franchising & Licensing: Two Powerful Ways to Grow Your Business in Any Economy
Franchising & Licensing: Two Powerful Ways to Grow Your Business in Any Economy
It is hard to believe that nearly 15 years have passed since the publication of
the first edition of Franchising & Licensing in 1991. The impact of technology
and globalization has had a permanent effect on the dynamics of the franchise
relationship. When the manuscript was being written for the first edition
in the late
...
Living Energies: An Exposition of Concepts Related to the Theories of Viktor Schauberger
Living Energies: An Exposition of Concepts Related to the Theories of Viktor Schauberger
It is very difficult to observe the extraordinary creativity and fruitfulness of Nature without a sense of wonder. But wonder is at odds with reason. It has been said that humanity's schism with Nature was contrived so that we could develop our sense of reason to the extent that we now experience. One of the outcomes of this, because they are...
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

PC Magazine January 2006
PC Magazine January 2006
Articles in January 2006 issue of PC Magazine

    * US High Court Refuses to Review RIM Patent Ruling
      by Reuters  
    * DTV Alliance Takes Mobile TV To The Masses
      by Bary Alyssa Johnson
    * Government
...
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Biodiversity under Threat (Issues in Environmental Science and Technology)
Biodiversity under Threat (Issues in Environmental Science and Technology)

'This is a timely, thoughtful and authoritative account of the current state of play on the ecological battlefront'. Rouvray D., 2008. Biodiversity for chemists. Chemistry World, 5 (1), p.p.64-65.

There is much public concern about threats to global biodiversity. Industrial pollution, changes in agricultural practices...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy