Learn, prepare, and practice for AWS Certified Cloud Practitioner CLF-C02 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS).
In the simplest terms, event-driven architectures are like onions; they are manageable as a single layer (like a monolith) but when you get into them, they begin to cascade apart and you quickly realize that there are many complex layers (distributed microservices architecture).
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space.
Evolving from Digital Transformation to Digital Acceleration Using The Galapagos Framework challenges established thinking and offers a new way to deliver digital change.
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency.
Tabletop exercises are a common way to test disaster recovery and business continuity plans, but they can also be some of the most dry and boring meetings any professional can attend.
This book offers the use of artificial intelligence, image processing, model analysis, laser scanners, shearography, drones, contourlet, wavelet, signal processing techniques and other SHM techniques to detect the damages in the concrete as well as masonry structures.
This encyclopedia provides a comprehensive reference to topics in biometrics including concepts, modalities, algorithms, devices, systems, security, performance testing, applications and standardization.
This book compiles selected papers from the International Conference on Electrical Systems and Smart Technologies (ICESST 2024), held in Dakhla, Morocco (December 11-13, 2024).
Learn to run your own simulation by working with model analysis, mathematical background, simulation output data, and most importantly, a network simulator for wireless technology.
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Two concerns should be acknowledged when discussing distributed systems: it is one thing to construct middleware, but it is quite another issue to use them to create applications that can perform in a distributed environment.
This single, comprehensive resource responds to the high demand for specialitsts to be able to provide advice to users, as well as day-to-day administration, maintenance, and support of computer systems and networks.