Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Beginning SQL Server Reporting Services
Beginning SQL Server Reporting Services

Learn SQL Server Reporting Services and become current with the 2016 edition. Develop interactive, dynamic reports that combine graphs, charts, and tabular data into attractive dashboards and reports to delight business analysts and other users of corporate data. Deliver mobile reports to anywhere and any device. Build vital...

Web Development with Go: Building Scalable Web Apps and RESTful Services
Web Development with Go: Building Scalable Web Apps and RESTful Services

Take a deep dive into web development using the Go programming language to build web apps and RESTful services to create reliable and efficient software. Web Development with Go provides Go language fundamentals and then moves on to advanced web development concepts and successful deployment of Go web apps to the cloud. 

...

Windows Installation and Update Troubleshooting
Windows Installation and Update Troubleshooting

Understand, troubleshoot and repair issues with local Windows installations, automating the OS deployment and configuring updates via WSUS and Windows Intune. When tasked with deploying Windows operating systems, there can seem to be an overwhelming amount of tools and techniques to learn to master this process. Whether you are installing a...

App Development Recipes for iOS and watchOS: A Problem-Solution Approach
App Development Recipes for iOS and watchOS: A Problem-Solution Approach
App Development Recipes for iOS and watchOS explores the technical side of app development with tips and tricks to avoid those little things that become big frustrations, outside of the realm of development, causing many people to throw up their hands and say “It’s just not worth the...
Interview Questions in Business Analytics
Interview Questions in Business Analytics

Discover relevant questions―and detailed answers―to help you prepare for job interviews and break into the field of analytics. This book contains more than 200 questions based on consultations with hiring managers and technical professionals already working in analytics. Interview Questions in Business Analytics: How to Ace...

Securing PHP Apps
Securing PHP Apps

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home...

Practical Hadoop Migration: How to Integrate Your RDBMS with the Hadoop Ecosystem and Re-Architect Relational Applications to NoSQL
Practical Hadoop Migration: How to Integrate Your RDBMS with the Hadoop Ecosystem and Re-Architect Relational Applications to NoSQL

Re-architect relational applications to NoSQL, integrate relational database management systems with the Hadoop ecosystem, and transform and migrate relational data to and from Hadoop components. This book covers the best-practice design approaches to re-architecting your relational applications and transforming your relational data to...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
Building Embedded Systems: Programmable Hardware
Building Embedded Systems: Programmable Hardware
 This is a book about developing the software and hardware you never think about. We're talking about the nitty-gritty behind the buttons on your microwave, inside your thermostat, inside the keyboard used to type this description, and even running the monitor on which you are reading it now. Such stuff is termed embedded systems,...
Typed PHP: Stronger Types For Cleaner Code
Typed PHP: Stronger Types For Cleaner Code

Discover how stronger types mean cleaner, more efficient, and optimized PHP applications. This unique book looks at typed PHP: PHP types, strings, regular expressions, and more from PHP 7 as found in standard PHP libraries, user libraries, extensions, and cross-compilers. You'll see how to create a set of reusable tools that...

Handbook of Methadone Prescribing and Buprenorphine Therapy
Handbook of Methadone Prescribing and Buprenorphine Therapy

Methadone and buprenorphine are the only two opioids that are indicated for the management of both pain and opioid-related drug addiction. Both present unique challenges to the general practitioner and pain specialist, requiring a separate analysis from the rest of the drugs in the same family.

Handbook of Methadone Prescribing and...

Result Page: Previous 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy