Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.

Glossary of Distributed Computing Terms 8th Ed: Updated for Windows 10, A+, Net+, Security+, and CCNA R&S, 5245 terms

Short (4-8 hour) course showing Java developers how to use Maven to create complex projects and manage dependencies using Eclipse 4.5 EE. Techniques work well in all versions of Eclipse 4 and Eclipse 4 EE, most work in Eclipse 3 with minor modifications..

Hacking: The Ultimate Beginners to Experts Guide to Computer Hacking, Penetration Testing and Basic Security Coding

Hacker and malicious activity has in the past few years been on the rise and this is specifically in the last one year. The attacks and threats have been on the rise and the impact to the online world is far-reaching. Attacks have been a source of concern to ordinary internet users and a problem too to corporate entities.

Instant Citrix Security How-to

A guide to bulletproofing your enterprise environment with the excellent security features in Citrix

Practical Hadoop Security 2014th Edition

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches 1st ed. 2016 Edition

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner.

Advanced Computing and Systems for Security: Volume 2 1st ed. 2016 Edition

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India.


1 2 3 4 5 Last