Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies,...

Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes
Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes

Build an in-depth understanding of the Istio service mesh and see why a service mesh is required for a distributed application. This book covers the Istio architecture and its features using a hands-on approach with language-neutral examples. To get your Istio environment up and running, you will go through its setup and...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Programming Google App Engine
Programming Google App Engine
On the Internet, popularity is swift and fleeting. A mention of your website on a popular blog can bring 300,000 potential customers your way at once, all expecting to find out who you are and what you have to offer. But if you’re a small company just starting out, your hardware and software aren’t...
Automating Microsoft Azure with Powershell
Automating Microsoft Azure with Powershell

Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments

About This Book

  • Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
  • ...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Practical AWS Networking: Build and manage complex networks using services such as Amazon VPC, Elastic Load Balancing, Direct Connect, and Amazon Route 53
Practical AWS Networking: Build and manage complex networks using services such as Amazon VPC, Elastic Load Balancing, Direct Connect, and Amazon Route 53

Your one step guide to learn all about AWS networking.

Key Features

  • Master your networking skills on Public Cloud.
  • Gain hands-on experience of using Amazon VPC, Elastic Load Balancing, Direct Connect and other AWS products.
  • Implement troubleshooting skills...
Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Data Streams: Algorithms and Applications (Foundations and Trends in Theoretical Computer Science)
Data Streams: Algorithms and Applications (Foundations and Trends in Theoretical Computer Science)
Data stream algorithms as an active research agenda emerged only over the past few years, even though the concept of making few passes over the data for performing computations has been around since the early days of Automata Theory. The data stream agenda now pervades many branches of Computer Science including databases, networking, knowledge...
Active Directory For Dummies (Computer/Tech)
Active Directory For Dummies (Computer/Tech)

Fully updated with all the exciting AD enhancements!

Design and deploy Active Directory to simplify policy and security management

This is not your dad's AD! Whether you just need to upgrade your knowledge from previous versions or you're starting fresh with Active Directory, this...

Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
RabbitMQ Essentials
RabbitMQ Essentials

Hop straight into developing your own messaging applications by learning how to utilize RabbitMQ with this book and ebook

Overview

  • Refresh your knowledge of the basics of message-orientated architecture and witness how powerful RabbitMQ can be when building your messaging applications
  • ...
Result Page: 50 49 48 47 46 45 44 43 42 41 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy