-
Building a Red Hat OpenShift Environment on IBM Z
Author Lydia Parziale , Alexandre de Oliveira , Anna Shugol , Elton de Souza , Wilhelm Mild
Cybersecurity is the most important arm of defense against cyberattacks. With the recent increase in cyberattacks, corporations must focus on how they are combating these new high-tech threats. When establishing best practices, a corporation must focus on employees' access to specific workspaces an....
Release Date 2022/08 -
Unreal Engine 5 Character Creation, Animation, and Cinematics
Author Henk Venter , Wilhelm Ogterop
Get to grips with the base workflow and create your own cinematic scenes in UE5 by learning to develop the main elements, animate, and combine them into a complete rendered movie scene with the help of key images printed in colorKey FeaturesPerform your entire rigging and animation workflow inside U....
Release Date 2022/06 -
IBM Spectrum Protect Plus Practical Guidance for Deployment, Configuration, and Usage
Author Bert Dufrasne , Daniel Wendler , Joerg Walter , Peter Minig , Mikael Lindstrom , Wilh
IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery, replication, retention, and reuse for virtual machines, databases, and applications in hybrid multicloud environments.IBM Knowledge Center for IBM Spectrum® Protect Plus p....
Release Date 2019/11 -
Building Machine Learning Systems with Python - Third Edition
Author Matthieu Brucher , Wilhelm Richert , Luis Pedro Coelho
Get more from your data by creating practical machine learning systems with PythonKey FeaturesDevelop your own Python-based machine learning system Discover how Python offers multiple algorithms for modern machine learning systems Explore key Python machine learning....
Release Date 2018/07 -
The Biml Book: Business Intelligence and Data Warehouse Automation
Author Cathrine Wilhelmsen , Benjamin Weissman , Raymond Sondak , Reeves Smith , Simon Peck
Learn Business Intelligence Markup Language (Biml) for automating much of the repetitive, manual labor involved in data integration. We teach you how to build frameworks and use advanced Biml features to get more out of SQL Server Integration Services (SSIS), Trans....
Release Date 2017/10 -
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Author Stephen Hilt , Kyle Wilhoit , Aaron Shbeeb , Bryan Singer , Clint Bodungen
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to ....
Release Date 2016/09 -
Professional Penetration Testing
Author Thomas Wilhelm
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability iden....
Release Date 2015/08 -
Drive Growth Through Sustainable Business Practices (Collection)
Author Eric Olson , Peter A. Soyka , Kevin Wilhelm
A brand new collection of best practices for growing businesses and profits through sustainability… 3 authoritative books, now in a convenient e-format, at a great price!3 authoritative books deliver world-class insights, methodologies, and strategies for accelerati....
Release Date 2013/12 -
Making Sustainability Stick: The Blueprint for Successful Implementation, Premium Edition
Author Kevin Wilhelm
A brand new collection of world-class business sustainability solutions… 2 authoritative books, now in a convenient e-format, at a great price!2 authoritative eBooks deliver expert guidance for successfully and continually integrating sustainability throughout your ....
Release Date 2013/10 -
Making Sustainability Stick: The Blueprint for Successful Implementation
Author Kevin Wilhelm
This book provides the blueprint for implementation, breaking down barriers, and the steps required to integrate sustainability successfully into any business. It is laid out in easily digestible chapters, with action steps backed up from interviews with sustainabi....
Release Date 2013/09 -
Professional Penetration Testing, 2nd Edition
Author Thomas Wilhelm
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of....
Release Date 2013/06 -
Author Bob Willard , Kevin Wilhelm
This book highlights the risk of inaction for businesses when it comes to climate change, but also contains best practices to allow them to capitalize on the numerous business opportunities that climate change presents, including increased profitability, enhanced br....
Release Date 2013/04 -
Risk Assessment: Tools, Techniques, and Their Applications
Author Cheryl Wilhelmsen , Lee T. Ostrom
All the tools needed to perform a thorough risk assessment—whether you're working in insurance, forensics, engineering, or public safetyRisk analysis is the method of analyzing the dangers to individuals, businesses, and government agencies posed by potential natur....
Release Date 2012/07 -
The 8 Dimensions of Leadership
Author Emma Wilhelm , Mark Scullard , Jeffrey Sugerman
Don’t Be a One-Dimensional Leader! To be an effective leader you need to know your strengths—but that’s only part of the story. You also need a broad perspective on all the behaviors needed to be an effective leader. This book provides both. Usin....
Release Date 2011/05