-
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
Mastering Windows Security and Hardening - Second Edition
Author Mark Dunkerley , Matt Tumbarello
A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principlesKey FeaturesLearn to protect your Windows environment using zero-trust and a multi-layered security approachImplement securit....
Release Date 2022/08 -
Mastering Linux Security and Hardening
Author Donald A. Tevault
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.About This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such a....
Release Date 2018/01 -
Sage 50 Accounts For Dummies, 3rd UK Edition
Author Jane E. Kelly
The easy way to come to grips with Sage 50 AccountsWritten by a Sage 50 Accounts expert and packed with step-by-step instructions, this hands-on, accessible guide is the easiest way to master this popular small business accounting software. Walking you through every....
Release Date 2015/06 -
Building Expertise: Cognitive Methods for Training and Performance Improvement
Author Ruth Colvin Clark
This third edition of the classic resource, Building Expertise draws on the most recent evidence on how to build innovative forms of expertise and translates that evidence into guidelines for instructional designers, course developers and facilitators, technical com....
Release Date 2008/09 -
Author Elaine Marmel
Let Sage Timeslips For Dummies show you how to turn your time into moneyIf you run a business that bills for its time, it's time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips inte....
Release Date 2014/03 -
Principles and Practices of Interconnection Networks
Author Brian Patrick Towles , William James Dally
One of the greatest challenges faced by designers of digital systems is optimizing the communication and interconnection between system components. Interconnection networks offer an attractive and economical solution to this communication crisis and are fast b....
Release Date 2004/03 -
Sage Instant Accounts For Dummies
Author Jane E. Kelly
Get to grips with Sage Instant Accounts in simple steps.This comprehensive guide walks you through every aspect of setting up and using Sage Instant Accounts, from downloading and installing the software to customizing it to your needs. Packed with handy step-by-ste....
Release Date 2014/06 -
Author Suraj Gaurav , Suren Machiraju
Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NE....
Release Date 2015/06 -
Geopolitics and Expertise: Knowledge and Authority in European Diplomacy
Author Merje Kuus
Geopolitics and Expertise is an in-depth exploration of how expert knowledge is created and exercised in the external relations machinery of the European Union.Provides a rare, full-length work on transnational diplomatic practiceBased on a rigorous and empirical st....
Release Date 2014/03 -
Routing, Flow, and Capacity Design in Communication and Computer Networks
Author Deep Medhi , Michal Pioro
In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have bee....
Release Date 2004/07 -
Linux Hardening in Hostile Networks: Server Security from TLS to Tor
Author Kyle Rankin
Implement Industrial-Strength Security on Any Linux ServerIn an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-fa....
Release Date 2017/07 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Author Thomas Akin
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco ro....
Release Date 2002/02 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Mastering Linux Security and Hardening - Second Edition
Author Donald A. Tevault
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a L....
Release Date 2020/02 -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02