" "



:






...

.. 1 ... 83 84 85 86 87 88 89 90 91 ... 97

Cloud Computing Networking: Cloud Computing Networking
: Lee Chao
: Auerbach Publications
: 2015
: PDF
: 32
: / English

Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s. As more and more companies and educational institutions plan to adopt a cloud-based IT infrastructure, todays job market requires IT professionals who understand cloud computing and have hands-on experience developing cloud-based networks. Cloud Computing Networking: Theory, Practice, and Development covers the key networking and system administration concepts as well as the vital hands-on skills you need to master cloud technology.
: black 20-05-2016, 17:49 | : 0 |
Computer and Information Security Handbook: Computer and Information Security Handbook
: John Vacca
: Morgan Kaufmann
: 2013
: PDF
: 67,2
: / English

The second edition of the Computer and Information Security Handbook provides a complete view of computer security and privacy. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues, allowing the reader to develop a new level of technical expertise.
: black 20-05-2016, 15:40 | : 0 |
VMware vRealize Orchestrator Essentials: VMware vRealize Orchestrator Essentials
: Daniel Langenhan
: Packt Publishing
: 2015
: PDF, EPUB
: 19,2
: / English

The automation of virtual environments has become the focus of many endeavors. VMware vRealize Orchestrator is a tool that enables you to automate not only your VMware environments, but also the surrounding hardware and software infrastructure. Orchestrator is also a central tool in the VMware cloud initiative and is extensively used by products such as vRealize Automation.
: black 20-05-2016, 15:02 | : 0 |
CEH v9: Certified Ethical Hacker Version 9 Study Guide, 3rd Edition
: CEH v9: Certified Ethical Hacker Version 9 Study Guide, 3rd Edition
: Sean Oriyano
: Wiley
: 2016
ISBN : 978-1-119-25224-5
: 761
: PDF
: 12,5 M
: English

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material.
: vitvikvas 20-05-2016, 14:03 | : 0 |
    (2- .)
: (2- .)
: .., .., .., ..
: .: ""
: 2016
: 428
: PDF
: 54.5
:

, , D-Link. .
: MIHAIL62 20-05-2016, 02:16 | : 0 |
Unauthorized Access: The Crisis in Online Privacy and Security
: Robert H. Sloan, Richard Warner
: Unauthorized Access: The Crisis in Online Privacy and Security
: CRC Press
: 2013
ISBN: 978-1439830130
: English
: pdf
: 22,7 mb
: 398

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security.
: daromir 18-05-2016, 19:15 | : 0 |
Getting Started with HTML5 WebSocket Programming: Getting Started with HTML5 WebSocket Programming
: Vangos Pterneas
: Packt Publishing
: 2013
: PDF, EPUB, MOBİ
: 8,1
: / English

WebSockets are capable of bi-directional, full-duplex communication over a persistent TCP connection They provide many benefits compared to the alternatives (for example, long-polling or Comet), such as lower overhead, persistent connections, and low latency. In short, it is the most technically challenging HTML5 feature to implement, but for truly interactive websites, it's a technology worth learning.
: black 18-05-2016, 19:02 | : 0 |
Advanced Google AdWords, 3rd Edition: Advanced Google AdWords, 3rd Edition
: Brad Geddes
: Sybex
: 2014
: PDF, EPUB
: 65,4
: / English

This is the ultimate guide for those who want to quickly get beyond AdWords basics to learn and apply the advanced techniques and tactics that are used by Fortune 500 companies. The book provides insight into AdWords' functionality and advanced features, explaining how they work and providing tips, tactics, and hands-on tutorials, which readers can immediately use on their own PPC campaigns.
: black 18-05-2016, 16:21 | : 0 |
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks: Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
: Mike O'Leary
: Apress
: 2015
: PDF, EPUB
: 24,7
: / English

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.
: black 17-05-2016, 16:07 | : 0 |
-   .
: - .
: .., .., .., ..
:
: 2010
: 320
: pdf
: 15 mb
:

- , .
, -, .
- , , -.
: 17-05-2016, 13:30 | : 0 |

.. 1 ... 83 84 85 86 87 88 89 90 91 ... 97

 MirKnig.Su  2017