Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

The Innovative CIO: How IT Leaders Can Drive Business Transformation
The Innovative CIO: How IT Leaders Can Drive Business Transformation

“Does your organization fumble when it comes to innovation? ‘The Innovative CIO’ presents a pragmatic guide to overcoming the 10 ‘innovation killers’ within your company.”  --Dennis McCafferty “CIO Insight”, 1/23/2013...

Beginning Windows 8
Beginning Windows 8

Windows 8 has been described by Microsoft as its ‘boldest’ Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system.

You will learn, with non-technical
...

Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Information is the most valuable resource in the 21st century. Whether for a consumer looking for a restaurant in San Francisco, a small business woman checking textile prices in Bangalore, or a financial services executive in London studying stock market trends, information at the moment of decision is key in providing the...
Computing Networks: From Cluster to Cloud Computing (ISTE)
Computing Networks: From Cluster to Cloud Computing (ISTE)

“Computing Networks” explores the core of the new distributed computing infrastructures we are using today:  the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Exam 70-411 Administering Windows Server 2012 (Microsoft Official Academic Course Series)
Exam 70-411 Administering Windows Server 2012 (Microsoft Official Academic Course Series)

Microsoft Windows Server is a multi-purpose server designed to increase reliability and flexibility of  a network infrastructure. Windows Server is the paramount tool used by enterprises in their datacenter and desktop strategy. The most recent versions of Windows Server also provide both server and client virtualization. Its...

x86 Instruction Set Architecture
x86 Instruction Set Architecture

The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Vagrant: Up and Running
Vagrant: Up and Running

Discover why Vagrant is a must-have tool for thousands of developers and ops engineers. This hands-on guide shows you how to use this open source software to build a virtual machine for any purpose—including a completely sandboxed, fully provisioned development environment right on your desktop.

Vagrant creator...

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy