State-of-the-Art Software Security Testing: Expert, Up to Date, and Comprehensive The Art of Software Security Testing delivers in-depth, up-to-date, battle-tested techniques for anticipating and identifying software security problems before the "e;bad guys"e; do.
Inclusive Radio Communication Networks for 5G and Beyond is based on the COST IRACON project that consists of 500 researchers from academia and industry, with 120 institutions from Europe, US and the Far East involved.
Big Data and Smart Service Systems presents the theories and applications regarding Big Data and smart service systems, data acquisition, smart cities, business decision-making support, and smart service design.
Master Oracle's PeopleSoft PeopleTools Data Administration and Upgrade ToolsetMaximize data integrity, maintain peak application performance, and keep your PeopleSoft environment up to date.
Migrate to a dynamic, on-demand data delivery platform"e;If you're looking to hit the ground running with any virtualization project, large or small, this book is going to give you the start you need, and along the way will offer you some cautionary tales that will even take some seasoned virtualization veterans by surprise.
Cutting-edge techniques from leading Oracle security expertsThis Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments.
The most comprehensive, current guide to networkingBuild and administer high-performance networks of all sizes from small home systems to enterprise internetworks using the practical information in this detailed resource.
Best Practices for Comprehensive Oracle Database SecurityWritten by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Evolve to a virtual network infrastructure using VMware vSphere 4Design and deploy a high-performance cloud-based enterprise IT platform with guidance from a VMware expert.
Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice.
This book gives a review of the principles, methods and techniques of important and emerging research topics and technologies in Channel Coding, including theory, algorithms, and applications.
A Complete Guide to Transmitting Electrical Power and Data over Ethernet CablesPower over Ethernet Interoperability explains how to safely transmit DC power over an existing data network cabling structure so that separate AC electrical wiring is not needed to power up devices connected to the network.
Optimized Cloud Resource Management and Scheduling identifies research directions and technologies that will facilitate efficient management and scheduling of computing resources in cloud data centers supporting scientific, industrial, business, and consumer applications.
One of the challenges of administering and supporting Microsoft(R) Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user's profile folders, and in the information store itself.
Master Cloud Computing with Oracle Enterprise Manager 12cGain organizational agility, foster innovation, and lower TCO by adopting a service-oriented, cloud-based IT solution.
Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focuses on the democratization of information independent of location or time, to the Tactile Internet, which democratizes skills to promote equity that is independent of age, gender, sociocultural background or physical limitations.
Implement a Hyper-V virtualization solutionMicrosoft Virtualization with Hyper-V shows you how to deploy Microsoft's next-generation hypervisor-based server virtualization technology in a corporate environment.
Cutting-edge social engineering testing techniques"e;Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic.
An essential guide for networking professionals responsible for implementing Wi-Fi 7 Join wireless networking experts Jerome Henry, Brian Hart, Binita Gupta, and Malcolm Smith on this deep dive into Wi-Fi 7 and 802.
Integrate Macs seamlessly into your Windows networkThese days, almost every Windows network must include Macs--and not just as second-class citizens with limited connectivity, but as full members of the network.
The Best Fully Integrated Study System Available for Exams 640-460 & 640-436With hundreds of practice questions and hands-on exercises, CCNA Cisco Certified Network Associate Voice Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.
Bestselling certification author and CompTIA training expert Mike Meyers updates his CompTIA Network+ Certification Passport to give you concise, focused coverage of the new 2015 exam.
Computation and Storage in the Cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost.
Security Smarts for the Self-Guided IT ProfessionalLearn how to improve the security posture of your organization and defend against some of the most pervasive network attacks.
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure.
Get up and running on Microsoft Windows Server 2008 with easeThis hands-on guide covers all the essentials of deploying and administering the latest release of Microsoft's powerful, versatile network operating system.
Master the latest digital security automation technologiesAchieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume.
Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks.
As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations.
Master Microsoft Office Online and OneDriveHow to Do Everything: Microsoft Office Online shows you how to use this versatile, free platform to create and save documents, presentations, and spreadsheets online and easily collaborate with others.
The Definitive UNIX Resource--Fully UpdatedGet cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels.
Build and manage a powerful network on Mac OS X ServerBoost productivity and foster collaboration using the powerful networking tools available in Mac OS X Snow Leopard Server.
Fully revised to cover the 2014 CompTIA Security+ objectives, this is a money-saving self-study bundle with bonus study materialsPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic.
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakersNew technologies have provided both incredible convenience and new threats.