Account
Orders
Advanced search
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester...
The CompTIA Linux+ Certification" book – the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification. Whether you're a beginner or an experienced professional, this comprehensive resource is designed to equip you with...
In today's business landscape, software engineering teams must deliver innovation faster than ever. However, outdated management approaches centered on tools and metrics rather than people strangle velocity and creativity. Legacy leaders cling to rigid structures...
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your...
This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of...
For companies and individuals already using Microsoft365 and other Microsoft technologies, this book is designed to reveal how to fully utilize these platforms for effective Knowledge Management without needing to rely on additional third-party tools. It addresses a...
This book covers the key principles, best practices, and practical techniques for designing and implementing visually compelling dashboards. It explores the various stages of the dashboard development process, from understanding user needs and defining goals, to...
This project-oriented book presents a hands-on approach to identifying migration and performance issues with experience drawn from real-world examples. As you work through the book, you will develop skills, knowledge, and deep understanding of Snowflake tuning...
This book teaches you how to evaluate a distributed system from the perspective of immutable objects. You will understand the problems in existing designs, know how to make small modifications to correct those problems, and learn to apply the principles of immutable...
This guide covers the fundamental technical principles and various business applications of Generative AI for planning, developing, and evaluating AI-driven products. It equips you with the knowledge you need to harness the potential of Generative AI for enhancing...
Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to...
Take a high-level tour of SAP oDATA integrations with frontend technologies like Angular using the SAP Mobile Services Platform. This book will give you a different perspective on executing SAP transactions on iOS using Angular instead of SAP-provided Fiori-based...
Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS,...
This book is your one-stop resource on MySQL database installation and server management for administrators. It covers installation, upgrades, monitoring, high availability, disaster recovery, security, and performance and troubleshooting. You will become fluent in...
This book fills a vacuum in the market for high-quality information on a VMware vSphere system and offers a thorough introduction to VMware virtualization. Written for novices and those seeking more information about vSphere, this book walks you through its key...
This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is...
This book focuses on the utilization of GoldenGate Services (GGS) in conjunction with a microservices architecture on the Oracle cloud (OCI), primarily for data migration and integration across various data sources and targets.The book begins with a practical example of...
This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs...
Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population, or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility...
Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it’s so significant, and offers organizations, regulatory bodies, and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers