Prepare for Microsoft Exam AZ-700 and help demonstrate your real-world mastery of planning, implementing, and maintaining Azure networking solutions, including hybrid networking, connectivity, routing, security, and private access to Azure services.
Dan Ariely's three New York Times bestselling books on his groundbreaking behavioral economics research, Predictably Irrational, The Upside of Irrationality, and The (Honest) Truth About Dishonesty, are now available for the first time in a single volume.
Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise.
Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise.
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations.
Best Practices, How-Tos, and Technical Deep Dives for Working VMware VI4/VI3 Pros Maximum vSphere is the comprehensive, up-to-the-minute, working reference for everyone who plans, implements, or administers VMware virtual infrastructure.
Learn, prepare, and practice for Red Hat RHCSA 8 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
The definitive practical guide to Azure Security Center, 50%+ rewritten for new features, capabilities, and threats Extensively revised for updates through spring 2021 this guide will help you safeguard cloud and hybrid environments at scale.
The definitive practical guide to Azure Security Center, 50%+ rewritten for new features, capabilities, and threats Extensively revised for updates through spring 2021 this guide will help you safeguard cloud and hybrid environments at scale.
Learn, prepare, and practice for Red Hat RHCE 8 EX294 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.
Learn, prepare, and practice for Red Hat RHCE 8 EX294 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.
Prepare for Microsoft Exam AZ-303-and help demonstrate your real-world mastery of architecting high-value Microsoft Azure solutions for your organization or customers.
Prepare for Microsoft Exam AZ-303-and help demonstrate your real-world mastery of architecting high-value Microsoft Azure solutions for your organization or customers.
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessaryRealistic examples & step-by-step activities: practice hands-on without costly equipmentThe perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data.
The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution "e;First Sobell taught people how to use Linux .
The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution "e;First Sobell taught people how to use Linux .
Transition to Microservices and DevOps to Transform Your Software Development Effectiveness Thanks to the tech sector's latest game-changing innovations-the Internet of Things (IoT), software-enabled networking, and software as a service (SaaS), to name a few-there is now a seemingly insatiable demand for platforms and architectures that can improve the process of application development and deployment.
Transition to Microservices and DevOps to Transform Your Software Development Effectiveness Thanks to the tech sector's latest game-changing innovations-the Internet of Things (IoT), software-enabled networking, and software as a service (SaaS), to name a few-there is now a seemingly insatiable demand for platforms and architectures that can improve the process of application development and deployment.
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services.
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services.
BETTER SUPPORT, LOWER COSTS: OPTIMIZE YOUR PC HARDWARE LIFECYCLE, FROM ACQUISITION TO DISPOSAL It typically costs four times as much to support a PC as it does to purchase it--often, even more.
The complexity of most real-time and embedded systems often exceeds that of other types of systems since, in addition to the usual spectrum of problems inherent in software, they need to deal with the complexities of the physical world.
As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary.
Replication Techniques in Distributed Systems organizes and surveys the spectrum of replication protocols and systems that achieve high availability by replicating entities in failure-prone distributed computing environments.
This book introduces the fundamental concepts and practical simulation te- niques for modeling different aspects of operating systems to study their g- eral behavior and their performance.
This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets.
This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems.