Pantalla :
Students of history are familiar with the evil endorsement, Adolf Hitler's reported acknowledegment of Armenian genocide as expressed through the rhetorical question Who remembers the Armenians? But...
This book, 'A Concise Guide to SSL/TLS for DevOps' is an introduction to SSL & TLS in application and operational environments and as such is a more technical in depth study than is typically the...
Google Cloud Platform for Data Engineering is designed to take the beginner through a journey to become a competent and certified GCP data engineer. The book, therefore, is split into three parts; the...
The threat landscape is developing at such a rate that traditional IT security controls can no longer protect us. Legacy IT security mechanisms deal with rules and signatures for known threats coming...
The concise guide to the CompTIA + security certification is a fast track book for those that wish to pursue the CompTIA + security certification. It covers every objective of the syllabus with explanations...
Organizations that have successfully laid a foundation for continuous innovation and agility have adopted microservice architectures to respond rapidly to the demands of their business. Microservices...
How can a small medium business build a data analytical platform that is affordable and capable for data science? Business Intelligence and advanced data analytic need not be out with the resources of...
For new managers recently promoted to their role one of the most daunting and confusing tasks is coming to terms with management accounting and finance. You may be highly technical and proficient in the...
This book is designed to help those in a DevOp environment that are new to API, visualization of networking, storage and the control and management of such interfaces. After all technology has changed...
New 2021 Edition with 12 new hands-on labsLearn fundamental to advanced GCP architectural techniques using 30 + real-world use cases.The 'Google Cloud Platform an Architect's Guide' is a comprehensive...
Biometric indicators, such as the subject's photograph have been used by border control for decades to manually identify travelers. However security now requires more stringent tests, so passport control...
This book, FinTech Rising aims to be an introduction to both Financial services generally and more specifically to Financial technology (FinTech). The book explores the financial Services environment,...
The Katoey of Gethsemane Soi is a dark physcological crime thriller set in Thailand.
What is Digital Transformation, why is it so important and why do so many transformation projects fail? More importantly, what can we do to make our transformation initiative succeed? These are a few...
As an entrepreneur you need to be interested in crowdsourcing. It can make the difference between success and failure. Believe me it can reduce your operational costs and make your profit margin swell....
There are many ways to earn extra money on the internet but to earn a living requires skill and knowedge. Theis book tries to outline the ways to be successful and the pitfalls when working on the Internet.
A seemingly low key unambitious undercover operation stumbles across a conspiracy that thrusts the ill-prepared investigators into direct conflict with dangerous and influential people. Suddenly a boring...
SevenAn armed robbery goes wrong and some quick thinking is required, two sisters are taken hostage. What seemed like a good idea at the time turns into a nightmare and nothing will be the same again...
This book is aimed at those wishing to learn how to do IP subnetting. This is often a confusing subject but in this short book we strive to show you a quick and simple metho that is use by the professionals.
The concise guide to Certified Ethical Hacker - version 8 is a compact study guide for those pursuing the Certified Ethical Hacker Certification.This book summarizes all you need to know in the twenty...
This book is an SRS - a Secification and Requirements document for designing your own free penetration testing and hacking platform.
This book is designed to help companies of all size become GDPR ready. It aims at supplying the relevant knowledge as well as the techniques and practical tools you will need to take your business to...
This book is an introduction to the fundamentals of Artificial Intelligence its aim is to introduce A.I. through its history, its contemporary role in society and the economy. We then lift the hood to...
One of the key and highly valued interpersonal skills is assertiveness. For the new manager assertiveness is a required skill that they will have to develop in order for them to communicate and interact...
The Supply Chain has undergone tremendous change over the last decade or so transforming from boring administrative functions into the life blood of the business. Technological advances as well as globalisation...
This ebook is a concise guide to learning dynamic web applications using PHP, MySQL and Apache in a simplified manner. You will learn how to create applications and write programs, that are dynamic and...
Just as the EU GDPR set out the stringent rules to contain the security and privacy malpractices of online business when conducting business with EU citizens the CCPA will also enforce the best behavior...
This book is an introduction to Robotics, it aims to introduce the reader to the world of robots, how they work and how science strives to transform them from simple electro-mechanical contraptions into...
A practical guide to capturing and analyzing network traffic using Wireshark. This book shows real world network traffic analysis and shows the techniques that DevOp teams need to use to detect malicious...
This book is an introduction to Intent Based Networking and how your business can leverage many of the benefits that it realises through network modernisation, optimisation and business alignment.Organisations...
Puede que no esté disponible para la venta en tu país, sino sólo para la venta desde una cuenta en Francia.
Si la redirección no se produce automáticamente, haz clic en este enlace.