0408~0410_屁屁偵探讀本13對決!怪盜學院星星篇
0408~0410_4月選書

英文書 > 全部商品

The Cybersecurity Maturity Model Certification (CMMC)

Ingram 出版
2020/11/04 出版

The United States DoD (Department of Defense) is one of the largest employers in the world, with about 2.87 million employees. It spends more than a year among more than 350,000 contractors and subcontractors throughout its supply chain.Information in the DoD network is shared digitally across the contractor and subcontractor supply chain, offering an irresistible target for nation-states and cyber criminals.Protecting the DoD supply chainThe CMMC (Cybersecurity Maturity Model Certification) was developed to step up measures for protecting the DoD supply chain. Its objectives are to standardize cybersecurity controls and ensure that effective measures are in place to protect CUI (Controlled Unclassified Information) on contractor systems and networks.All companies doing business with the DoD, including subcontractors, must become certified by an independent third-party commercial certification organization.Your essential guide to understanding the CMMCTo help you get to grips with the CMMC, this essential pocket guide covers: What the CMMC is and why it has been introducedWho needs to comply with the CMMCThe implementation processThe road to certificationCMMC implications for firms doing business with the US governmentSuitable for senior management and the C-suite, general or legal counsel, IT executives, IT organizations, and IT and security students, this pocket guide will give you a solid introduction to the CMMC and its requirements.

9 特價803
立即代訂
下次再買

Learning by Practicing - Mastering TShark Network Forensics

Nik,Alleyne  著
Ingram 出版
2020/11/04 出版

The book you have been waiting for to make you a Master of TShark Network Forensics, is finally here!!! Be it you are a Network Engineer, a Network Forensics Analyst, someone new to packet analysis or someone who occasionally looks at packet, this book is guaranteed to improve your TShark skills, while moving you from Zero to Hero. Mastering TShark Network Forensics, can be considered the definitive repository of practical TShark knowledge. It is your one-stop shop for all you need to master TShark, with adequate references to allow you to go deeper on peripheral topics if you so choose. Book Objectives: Introduce packet capturing architecture Teach the basics of TShark Teach some not so basic TShark tricks Solve real world challenges with TShark Identify services hiding behind other protocols Perform "hands-free" packet capture with TShark Analyze and decrypt TLS encrypted traffic Analyze and decrypt WPA2 Personal Traffic Going way beyond - Leveraging TShark and Python for IP threat intelligence Introduce Lua scripts Introduce packet editing Introduce packet merging Introduce packet rewriting Introduce remote packet capturing Who is this book for?While this book is written specifically for Network Forensics Analysts, it is equally beneficial to anyone who supports the network infrastructure. This means, Network Administrators, Security Specialists, Network Engineers, etc., will all benefit from this book. Considering the preceding, I believe the following represents the right audience for this book: Individuals starting off their Cybersecurity careers Individuals working in a Cyber/Security Operations Center (C/SOC) General practitioners of Cybersecurity Experienced Cybersecurity Ninjas who may be looking for a trick or two Anyone who just wishes to learn more about TShark and its uses in network forensics Anyone involved in network forensics More importantly, anyhow who is looking for a good read Not sure if this book is for you? Take a glimpse at the sample chapter before committing to it. Mastering TShark sample chapters can be found at: https: //bit.ly/TShark All PCAPS used within this book can be found at: https: //github.com/SecurityNik/SUWtHEh-As an addition to this book, the tool, pktIntel: Tool used to perform threat intelligence against packet data can be found at: https: //github.com/SecurityNik/pktIntel

9 特價1692
立即代訂
下次再買

Alice and Bob Learn Application Security

Tanya,Janca  著
Wiley 出版
2020/11/04 出版

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

9 特價1778
立即代訂
下次再買

React and Libraries

Elad,Elrom  著
Apress 出版
2020/11/03 出版

Harness the power of React and the related libraries that you need to know to deliver successful front-end implementations. Whether you are a beginner getting started or an existing React developer, this book will provide you with the must-have knowledge you need in your toolbox to build a complete app. Start by learning how to create and style your own components, add state management, and manage routing. You'll also learn how to work with the backend using the MERN stack (MongoDB, Express, React, and Node.js). Once you have completed building your app you will learn how to deliver quality software by conducting unit testing, integration testing, and end-to-end (E2E) testing, as well as learn techniques to debug, profile, and optimize your React app. Libraries and tools covered include TypeScript, Material-UI, Styled Components, SCSS, React Router, Redux Toolkit, Recoil, Jest, Enzyme, Sinon, MongoDB, NodeJS, Express, Serve, Grunt, Puppeteer, ESLint, Prettier and many others. And, you'll get access to bonus material and learn how to conduct and nail React interview questions. Each chapter in this book can be used independently so you can pick and choose the information you'd like to learn. Use it to get deep into your React development world and find out why React has been rated the most loved framework by front-end developers for three years in a row. What You'll LearnReview the basics of DOM, React Virtual DOM, JSX, Babel, ES5/ES6, CRA, package manager, Yarn, Webpack, and build toolsWrite your own custom React components and learn about hooks and props.Apply routing and state management with React Route, Recoil, and Redux ToolkitDeliver quality software and reduce QA load by learning unit testing integration testing and end-to-end testing with libraries such as Jest, Jest-dom, Enzyme, Sinon, and PuppeteerSet an ultimate React automated development andCI cycle with ESLint, Prettier, Husky, Jest, Puppeteer, GitHub Actions, Codecov.io, Coveralls, Travis, and DeepScanPublish your code on Ubuntu Server with the help of GruntOptimize your React app with pure components, lazy loading, prerender, precache, code splitting, tree shaking, reduce media size, and prefetching Who This Book Is For? This book is for new developers looking to start working on React applications, and React developers looking to expand on their existing knowledge. It is also suitable for developers coming from other front-end frameworks such as Angular and Vue who would like to add React to their toolbox.

9 特價1539
立即代訂
下次再買

Zero Trust Security

Jason,Garbis  著
Apress 出版
2020/11/03 出版

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.Zero Trust security has become a major industry trend, and yet there still is uncertainty about what it means. Zero Trust is about fundamentally changing the underlying philosophy and approach to enterprise security--moving from outdated and demonstrably ineffective perimeter-centric approaches to a dynamic, identity-centric, and policy-based approach.Making this type of shift can be challenging. Your organization has already deployed and operationalized enterprise security assets such as Directories, IAM systems, IDS/IPS, and SIEM, and changing things can be difficult. Zero Trust Security uniquely covers the breadth of enterprise security and IT architectures, providing substantive architectural guidance and technical analysis with the goal of accelerating your organization's journey to Zero Trust. What You Will Learn Understand Zero Trust security principles and why it is critical to adopt themSee the security and operational benefits of Zero TrustMake informed decisions about where, when, and how to apply Zero Trust security architecturesDiscover how the journey to Zero Trust will impact your enterprise and security architectureBe ready to plan your journey toward Zero Trust, while identifying projects that can deliver immediate security benefits for your organization Who This Book Is ForSecurity leaders, architects, and practitioners plus CISOs, enterprise security architects, security engineers, network security architects, solution architects, and Zero Trust strategists

9 特價1881
立即代訂
下次再買

Hacking

Sam,Griffin  著
Ingram 出版
2020/11/03 出版

HACKINGWith growing digital dependence and an increase in cyber threats, you cannot afford to be in the dark as far as your digital and online security is concerned. This book is a simple guide that will reveal the many potential risks and mistakes that can expose you to hackers.This is a book for anyone and everyone. If you use a mobile phone, computer, or any other digital device, then this book will serve as your complete guide to online security. The purpose of this book is to break down all you need to know about how you can be attacked online and how to protect yourself.Everything is written in plain language, so you don't have to be a computer expert to understand it. At the completion, you will feel educated on cyber security, and be perfectly prepared to stay safe online!Here Is A Preview Of What You'll Learn About Inside...The History Of HackingTypes Of HackersMalwarePhishing ScamsHow Wi-Fi Is HackedHow To Stay Protected From HackersMuch, Much More!

9 特價513
立即代訂
下次再買

On Thin Ice

Ingram 出版
2020/11/02 出版

With the advent of the Electronic Age, science and communication have attained previously unheard of levels of proficiency, precision and profitability. These advances have produced knowledge and learning that have changed the lives of everyone. In this respect, the computer and its sibling, thecellphone, have proved to be two of the most significant tools ever invented.Along with the progress in information and communication in this Electronic Age, a dark and ominous cloud closely follows. This is the DarkWeb. The Dark Web supports a fringe economy of cybercrime operating under the radar, allowing common criminals to enjoy a rewarding life of crime at their victim's expense. Both governments and businesses that do not recognize and mitigate the resulting cyberthreat, step carelessly On Thin Ice. This is the environment in which the cybersecurity experts in this book live and excel. Businesses and governments urgently require safeguards and processes to protect their data from cybercrime. These include maintenance, protection and storage of data (e.g., the government-regulated HIPAA and the NIST programs). To help you understand the dangers of cybercrime, the cybersecurity experts in this book will guide and save you countless hours of anxiety, research, and dire financial consequences. They reveal crucial steps that guide, protect and save any organization from the increasingly common cyberattacks being seen today.... The alternative is to step gingerly On Thin Ice.

9 特價1167
立即代訂
下次再買

Jumpstart Uikit

Apress 出版
2020/11/01 出版

​Learn to build modern, sleek, and powerful websites quickly and easily with UIKit, an open-source, responsive, and lightweight framework. This book reveals the massive potential of this amazing framework to help you prototype, develop, and customize your web projects as per your business requirementsResponsive web design is imperative nowadays as mobile sites become the de-facto standard. UIKit makes front-end design easier and helps speed up the development process significantly. You can build enterprise-level, feature-rich websites that work elegantly with a wide range of different device sizes and resolutions with minimum fuss.You'll play with the mobile-first grid component and an expansive set of intuitive CSS elements. UIKit simplifies the difficult task of crafting intricate and robust websites. Instead of loads of theory, this good read will help you get comfortable with the various utilities using comprehensive coding examples in an easy-to-understand manner. What You'll Learn Set up the UIKit's required build tools to get startedCreate a fully responsive, fluid, and nested grid layoutUse UIKit to take your first steps in responsive web designPlay with the wide-range of CSS components and elementsWork with design web elements such as Navigation, Cards, Modals, Forms, and Accordion. Who This Book Is For This book is aimed at newbies and beginners, who are keen to build responsive websites using the solid UIkit framework. It can also be a quick reference for web designers, who are acquainted with or use the UIkit toolset for their important projects.

9 特價1299
立即代訂
下次再買

Introducing Bootstrap 4

Apress 出版
2020/11/01 出版

Get introduced to front-end CSS frameworks using the latest version of Bootstrap. Through easy-to-follow instructions and examples, this book will prepare you to create powerful web applications using Bootstrap 4.5. This updated second edition of Introducing Bootstrap 4 builds your understanding of the basic rules of CSS, the SASS pre-compiler, Bootstrap, and how they work together. After learning to set up CSS on both Linux (Ubuntu) and Windows, you will discover how you can make use of templates and themes written for Bootstrap, and how to refine the user interface. You will also find out how you can utilize and activate components. Numerous screenshots and code snippets are provided to help explain and reinforce the concepts discussed in the book. CSS frameworks give front-end developers the capability to create responsible and adaptive web designs that are able to accommodate the various variations of modern browsers. Start front-end development using Bootstrap 4.5 with this book. What You Will Learn Explore the Bootstrap features required to create web applicationsUnderstand the basics of responsive web design using CSS 3Install the SASS framework and understand how to use itMaster practical aspects of using Bootstrap in real-life scenarios Who This Book Is For This book is intended for beginner-level web designers and developers interested in front-end development.

9 特價2223
立即代訂
下次再買

Domain-Driven Laravel

Apress 出版
2020/11/01 出版

Map concepts and ideas in domain-driven design (DDD) and transpose them into clean, testable, and quality code that is effective alongside the Laravel framework. This book teaches you how to implement the concepts and patterns present in DDD in the real world as a complete web application. With these tactics and concepts in place, you'll engage in a variety of example applications, built from the ground up, and taken directly from real-world domains. Begin by reviewing foundational stepping stones (with small, manageable examples to show proof of concepts as well as illustrations to conceptualize the more complex topics) of both DDD and Laravel. Specifically, such topics as entities, value objects, developing an ubiquitous language, DTOs, and knowledge discovery. Next, you will dive into some more advanced topics of DDD and use these concepts as a guide to make customizations to the default Laravel installation, giving you an understanding of why these alterations are vital to the DDD and Laravel platform. Finally, you will cover the very powerful Eloquent ORM that comes stock with Laravel and understand how it can be utilized to represent entities, handle repositories, and support domain events. Although there is a basic coverage chapter and a setup tutorial for Laravel (along with a high level intro about the components used within it), Domain-Driven Laravel is best suited to readers who have been at least exposed to the framework and have had the opportunity to tinker around with it.What You'll Learn Utilize a blazing-fast rapid development pipeline built from DDD building blocks and facilitated with LaravelImplement value objects, repositories, entities, anti-corruption layers and others using Laravel as a web frameworkApply enhanced techniques for quick prototyping of complex requirements and quality results using an iterative and focused approach Create a base framework (Laravel) that can serve as a template to start off any projectGain insight on which details are important to a project's success and how to acquire the necessary knowledge Who This Book Is ForIdeal for for frontend/backend web developers, devops engineers, Laravel framework lovers and PHP developers hoping to learn more about either Domain Driven Design or the possibilities with the Laravel framework. Those with a working knowledge of plain PHP can also gain value from reading this book.

9 特價2223
立即代訂
下次再買

Foundation Dynamic Web Pages with Python

David,Ashley  著
Apress 出版
2020/11/01 出版

Discover the concepts of creating dynamic web pages (HTML) with Python. This book reviews several methods available to serve up dynamic HTML including CGI, SSI, Django, and Flask. You will start by covering HTML pages and CSS in general and then move on to creating pages via CGI. It is easy to use and can serve as a foundation for the more advanced services available for launching dynamic web pages. Next you'll explore the SSI (Server Side Interface) method. This is a slightly more advanced interface included in mots web servers that adds functionality to modify static HTML pages to add such things as the current date or time, include additional HTML, and other features to a static web page before it is delivered to the user. The book also covers some of the key the Django module features, which must be added to the web server. These features include creating dynamic web pages and calling a database to provide additional information to the web page. Lastly you will explore the Flask module. While it has limited functionality on its own, it provides a very flexible environment to create a self designed system for delivery of dynamic web pages.By the time you finish this book, you will be able to choose the appropriate methodology for delivering dynamic information using fast HTML creation services.What You'll LearnUse HTML pages and CSS together to control the style of your web site.Install and configure SSI, Django, and Flask for Apache.Create dynamic web pages using CGI and creating a library of partial HTML pages to use in this task.Build dynamic web pages using SSI and auxiliary Python programs to enhance the SSI functionality.Develop dynamic web pages using Django.Who This Book Is ForSoftware Developers with basic Python programming skills interested in learning Web Development

9 特價1539
立即代訂
下次再買

Comptia Security+ Certification Study Guide

Apress 出版
2020/11/01 出版

Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues. Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more. What You Will Learn Identify the concepts of confidentiality, integrity, and availabilityImplement secure network administration principlesApply appropriate risk mitigation strategiesExplain the impact of physical security on computer and network securityUse assessment tools to discover security threats and vulnerabilitiesImplement appropriate security controls when performing account management Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more

9 特價2223
立即代訂
下次再買

Building Secure Firmware

Jiewen,Yao  著
Apress 出版
2020/11/01 出版

Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers.As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware--such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and UnifiedExtensible Firmware Interface (UEFI) specifications--and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modelingUnderstand the details of architecture, including protection, detection, recovery, integrity measurement, and access controlBe familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defensesKnow the techniques used for security validation and maintenanceWho This Book Is ForGiven the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware

9 特價1881
立即代訂
下次再買

Advances in Cryptology - Crypto 2020

Springer 出版
2020/11/01 出版

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows: Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions. Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation. Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.

9 特價5741
立即代訂
下次再買

Computer Security - Esorics 2020

Liqun,Chen  著
Springer 出版
2020/11/01 出版

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

9 特價2870
立即代訂
下次再買

Electronically Stored Information

Ingram 出版
2020/11/01 出版

Electronically Stored Information, Second Edition explains the reasons you need to know about electronic data. It also gets into great detail about the how, what, when, and where of what is known in legal circles as electronically stored information (ESI). With easy-to-understand explanations and guidelines, this book provides t

9 特價3131
立即代訂
下次再買

Critical Information Infrastructures Security

Awais,Rashid  著
Springer 出版
2020/11/01 出版

Chapter "A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

9 特價3392
立即代訂
下次再買

Practical Blockchains and Cryptocurrencies

Apress 出版
2020/11/01 出版

Create cryptocurrency and blockchain applications by examining the key algorithms and concepts pertaining to blockchains, transaction processing, mining, distributed consensus, and anonymous currencies. In this book, you'll develop a fully functional cryptocurrency from scratch in the Python language. Practical Blockchains and Cryptocurrencies is a reference for development of blockchain applications and provides you with rigorous information on cryptography and the theory underlying blockchains. This book consists of small chapters that focus on particular topics. You'll start with a short history of money. Next, you will survey the bitcoin and altcoin ecosystem before delving into cryptographic hash functions, symmetric encryption, public key cryptography, and digital signatures. All the mathematics required to develop blockchain applications is covered. The emphasis is on providing a lucid and rigorous exposition on the nature and working of these constructs. The next major segment of the book discusses the key concepts and algorithms required to develop blockchain and cryptocurrency applications. There are expositions on blockchain construction, Merkle trees, peer-to-peer networks, cryptocurrency addresses, transactions, and mining. You'll take a deep dive into the formation of consensus in distributed systems.In this book you'll develop a fully functional cryptocurrency called Helium from scratch in Python. The language requirements are modest since it is presumed that most readers will not be acquainted with Python. The entire source code and unit test code is included in this book.Practical Blockchains and Cryptocurrencies interleaves theory and Helium program code chapters in order to demonstrate the practical application of theory in working Helium program code. What You Will Learn Gain the mathematical foundations as well as the concepts and algorithms of blockchains and cryptocurrenciesImplement a cryptocurrency from scratch in PythonMaster the design of distributed blockchain applications Who This Book Is For Anyone interested in creating cryptocurrency and blockchain applications

9 特價2736
立即代訂
下次再買

Applications and Usability of Interactive TV8th Iberoamerican Conference, Jauti 2019, Rio de Janeiro, Brazil, October 29-November 1, 2019, Revised Selected Papers

Springer 出版
2020/11/01 出版

This book constitutes the refereed proceedings of the 8th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2019, in Rio de Janeiro, Brazil, in October 2019.The 10 full papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on Design and Development; Second Screen and Crossmedia; Interaction Techniques and Technologies; Accessibility; User Experience.

9 特價2870
立即代訂
下次再買

Software Defined Networking

Ingram 出版
2020/11/01 出版

This book provides a comprehensive treatment of software defined networking (SDN) suitable for new network managers and experienced network professionals. It explains the importance of virtualization; discusses SDN implementation and the impact on service providers, legacy networks, and network vendors; and investigates OpenFlow, the hand-in-glo

9 特價3392
立即代訂
下次再買

Learn Rails 6

Apress 出版
2020/11/01 出版

Effectively learn and apply software development and engineering techniques to web application development using Rails 6 with this accelerated tutorial. This book teaches modern engineering practices including git flow, containerization, debugging, testing, and deployment. Along the way, you'll see how to build a social network application and then deploy it on a cloud provider such as Amazon Web Services. After reading and using this book, you'll be able to effectively build and deploy your Rails application to the cloud. You'll also have used the Ruby on Rails framework to carry out the rapid development of an idea into a product without sacrificing quality. What You Will Learn Use the Ruby on Rails 6 web development framework Integrate Docker with your Ruby on Rails code Apply software engineering techniques to learning the Rails framework Design, build, and deploy a social networking application to the Amazon cloud Who This Book Is For Beginners with at least some prior programming experience. Ruby experience is helpful, but not required.

9 特價2736
立即代訂
下次再買

Audio and Speech Processing with MATLAB

Paul,Hill  著
Ingram 出版
2020/11/01 出版

This book will give the reader a comprehensive overview of contemporary speech and audio processing techniques from perceptual and physical acoustic models to a thorough background in relevant digital signal processing techniques together with an exploration of speech and audio applications.

9 特價4175
立即代訂
下次再買

Malware Analysis and Detection Engineering

Apress 出版
2020/11/01 出版

A one-stop solution for Malware Analysis, Reversing and Detection EngineeringCovers Binary Instrumentation, Windows ETW and Suricata IDS for malware detectionPresents hands-on lab solutions highlighting real world malware samples

9 特價3078
立即代訂
下次再買

Socio-Technical Aspects in Security and Trust

Thomas,Gro?  著
Springer 出版
2020/11/01 出版

The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.

9 特價2609
立即代訂
下次再買

Advances in Cryptology - Crypto 2020

Springer 出版
2020/11/01 出版

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows: Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions. Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation. Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.

9 特價5741
立即代訂
下次再買

Internet of Things with 8051 and Esp8266

Anita,Gehlot  著
Ingram 出版
2020/11/01 出版

This book provides a platform to get started with Internet of Things (IoT) with 8051 including programming basics and interfacing of the devices in designed systems. It presents a unique combination of 8051 with ESP8266 and I/O devices for IoT applications supported by case studies to provide the solutions to real time problems.

9 特價6628
立即代訂
下次再買

Advances in Cryptology - Crypto 2020

Springer 出版
2020/11/01 出版

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020. The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows: Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions. Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation. Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.

9 特價6263
立即代訂
下次再買

Advances in Digital Forensics XVI

Springer 出版
2020/11/01 出版

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

9 特價5741
立即代訂
下次再買

Applied Cryptography and Network Security18th International Conference, Acns 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I

Mauro,Conti  著
Springer 出版
2020/11/01 出版

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

9 特價4697
立即代訂
下次再買

Security and Cryptography for Networks

Springer 出版
2020/11/01 出版

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on blockchain; multiparty computation; oblivious RAM; primitives and constructions; signatures, encryption, and algebraic constructions; symmetric crypto; theory and lower bounds; zero-knowledge. *The conference was held virtually due to the COVID-19 pandemic.

9 特價5741
立即代訂
下次再買

Ict Systems Security and Privacy Protection

Springer 出版
2020/11/01 出版

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

9 特價6785
立即代訂
下次再買

Inclusive Radio Communications for 5g and Beyond

Ingram 出版
2020/11/01 出版

Inclusive Radio Communication Networks for 5G and Beyond is based on the COST IRACON project that consists of 500 researchers from academia and industry, with 120 institutions from Europe, US and the Far East involved. The book presents state-of-the-art design and analysis methods for 5G (and beyond) radio communication networks, along with key challenges and issues related to the development of 5G networks. This book is Open Access and was funded by: CNIT - Consorzio Nazionale Interuniversitario per le Telecomunicazioni European Association for Communications and Networking (EURACON), AISBL

9 特價8482
立即代訂
下次再買

Gatsby E-Commerce

Alex,Libby  著
Apress 出版
2020/10/31 出版

Leverage the power of Gatsby to quickly produce e-commerce sites that are efficient, fast, and secure. This project-oriented book simplifies the process of setting up a Gatsby e-commerce site from start to finish, providing a starting toolset that you can use to develop future projects and incorporate into your existing workflows. You'll learn to reduce reliance on tools that are bloated, prone to being hacked, and not the most efficient, and move over to the newest framework on the block. You'll also see how to use the Gatsby framework to rapidly create and deploy e-commerce sites that are performant and secure, with the minimum of fuss. Understand how to source data, build a catalog, add a blog, finesse your site (including performance), implement the checkout and payment processes with the help of third-party tools such as Stripe, and deploy to production. Finally, you'll learn how to migrate existing WooCommerce sites toGatsby, and adapt for mobile. Gatsby is fast and does away with the need for databases, thereby removing one of the biggest weak spots in any e-commerce site. It is based on Node.js and JavaScript, making it easy to extend and customize as requirements dictate. Learn to make your customers' lives easier and simpler using this book today. What You'll Learn Implement e-commerce sites using GatsbyExplore some of the options for architecting an e-commerce site using this frameworkGain an appreciation of pointers around maintenance requirements and ancillary needs (such as SEO)Compare your site to others that use different toolsWork through a project from start to finish, understanding what can be achieved using Gatsby, and where other tools may need to be brought into play Who This Book Is For Developers already familiar with JavaScript, who are keen to learn how toleverage the Gatsby framework to quickly create the basis of an e-commerce offer (from scratch, or using data tools such as WooCommerce to support a transition), with little more than a text editor. Developers who want to focus on simplicity, to produce efficient and properly optimized e-commerce sites in modern browsers using tools already in their possession.Those in agile development teams, where time is of the essence, and the pressure is on to deliver results quickly.

9 特價1881
立即代訂
下次再買

Blogging for God’s Glory in a Clickbait World

John,Beeson  著
Ingram 出版
2020/10/31 出版

7 Reasons God Hates ListiclesSee what we did there? We piqued your interest, confused you, and maybe even made you mad. Mad is good; anger provokes a response. Maybe you will tweet your rage. Perhaps you will decry our buffoonery: "The 'seven-reasons-why' structure is a list-article," you'll tell your followers. And just like that, we won the scramble for clicks and attention. But did we steward your attention in a way that honors God?Bloggers publish millions of posts each day, many written by faithful Christians who want to honor God with their words but struggle to know how. Blogging for God's Glory in a Clickbait World guides Christians through the basics of setting up a blog-everything from affiliates and algorithms to widgets and Wordpress-but also how to be a godly landlord of your internet real estate property. If you are a Christian blogger, you likely oscillate between burnout and apathy, with thoughts like "I must post NOW!" and "Who even gives a rip?" If you're at this point, you've likely lost the plot. But you can get back on script. Authors Benjamin Vrbicek and John Beeson explore where the spiritual stamina will come from to serve a small readership faithfully and how to steward attention in a way that honors God in a world that celebrates chasing profit and pageviews. Foreword by Tim Challies, pastor, author, and popular blogger.About the AuthorsBENJAMIN VRBICEK (MDiv, Covenant Theological Seminary) is the lead teaching pastor at Community Evangelical Free Church in Harrisburg, Pennsylvania. Benjamin and his wife, Brooke, have six children. He blogs regularly, is the author of Struggle Against Porn and Don't Just Send a Resume, and has written for Desiring God, The Gospel Coalition, For The Church, 9Marks, and Christianity Today.JOHN BEESON (MDiv, Princeton Theological Seminary) is a copastor at New Life Bible Fellowship in Tucson, Arizona. John and his wife, Angel, have two children. He blogs regularly and has written for The Gospel Coalition and For The Church.

9 特價634
立即代訂
下次再買

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation

Springer 出版
2020/10/29 出版

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019. The 9 papers presented in this volume were carefully reviewed and selected from 38 submissions. They were organized in topical sections named: computational intelligence; cyber security; and computational models.

9 特價2870
立即代訂
下次再買

How to start a Blog

Jim,Norton  著
Ingram 出版
2020/10/28 出版

Do you want to learn how you can make a potential of thousands a month blogging? Then keep on reading!I've been blogging for several years now. I started out blogging for pleasure somewhere around 2008 and have blogged ever since. In 2009, I opened my own business and learned I could use my blog to bring customers to my company. I began diving into the mechanics of blogging and have been expanding my knowledge of SEO, advertising, and more since then. Soon, I also began to learn about affiliate commission, paid surveys, sponsorship, and indirect monetization. It wasn't long before I was making so much money through my blog that I didn't need to work my business anymore, though I chose to keep it open.Soon I had freelance agreements, speaking commitments, membership sites and paid networks, and more. I began running courses, workshops, and classes. I started putting out books and eBooks. Now I have another avenue of helping others. I'm putting out my first book on how to make money blogging-this book. I hope you enjoy it!"How to Start a Blog: Learn the Best Techniques to Start Blogging Now. Turn Your Fans into Your Passive Income" covers: - The 11 things that you absolutely must know when starting a blog;- The deadly truth about profiting with blogs and how to overcome it;- How to truly measure a blogs success;- The secret to niche blogging;- The best-kept secret to setting up a successful blog;- Why design is important and how to design your blog to attract faithful readers and profit;- What makes a great blog and stellar tips for writing it;- A rundown and explanation of the 20 types of blogs that you won't get elsewhere;- How to successfully market and promote your blog to bring in substantial income;- The secrets to Search Engine Optimization;- How to use social media in conjunction with your blog to earn even more money;- How to grow your blog;- The 28 top secrets of successful blogs;- And more!Even if you're like me and are wondering how to start a blog and even if you know nothing about blogging, this book can help you! I start at the very basics and go all the way through to the nitty gritty of SEO and monetization. If I can do it, so can you!Add How to Start a Blog to your cart today!

9 特價718
立即代訂
下次再買

Decision and Game Theory for Security

Quanyan,Zhu  著
Springer 出版
2020/10/27 出版

This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020, held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.

9 特價2870
立即代訂
下次再買

Cybersecurity

Mit Press 出版
2020/10/26 出版

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics. It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.

9 特價579
立即代訂
下次再買

Podcast Authorized

Jenn,Foster  著
Ingram 出版
2020/10/26 出版

Learn How to Build a High-Performance Podcast and Book That Can Yield Double-Digit Returns.Over 50% of the homes are podcast fans! Podcasts are poised to eclipse traditional radio in listenership, and podcasts are opening the door to individuals, businesses, and celebrities alike to have their own show with no barrier to entry. The smartest thing you can do as a business owner, expert and industry leader is to build a platform of raving fans.One of the best and easiest ways to attract new buyers, clients, and fans to you is through a podcast and a book. Watch your business grow as you create unique, expert content.With this expert advice, you'll learn: - How to get your book written, edited, and designed painlessly- How to use your podcast to write your book- What to do after your book is published to get maximum results- How to turn your book into a podcast - How to create a book promotion super-team (if no one gets the book, what's the point...your super-team will get it into the right hands)- How to 10x your referrals in 30-days using your book- How to position your book to attract the right clients (this is critical and most authors miss the mark...they end up frustrated, with a book that collects dust)This book sprung for from a podcast interview with Steve Gordon, who we had never met before. Because of our podcast Elite Expert Insider, we decided to do a webinar together which turned into this book. That's the power of a podcast.85 percent of listeners will hear all, or at least most of, each episode of your podcast! If you are an entrepreneur or solopreneur, having a podcast and a book can give you opportunities and relationships your business never had before. This is a recipe for success when done right. Learn how podcasting and having a book can profit your business. Don't miss out on the opportunity to take your business to the next level! Expert podcast secrets from Steve Gordon, The Unstoppable CEO Podcast. Expert book publishing insights from #1 Bestselling Authors Jenn Foster & Melanie Johnson.

9 特價1026
立即代訂
下次再買

Networking for Beginners

2020/10/25 出版

Are you going to start a new professional experience, which requires minimum knowledge of computer networking but you have no specific network awareness?Are you simply curious to know how your different electronic devices work together and which technologies are used to make this happen?Certainly, everyone agrees that the Internet, today, is the most important means of communication, not only for the information you can find on different websites.Think of the various email, chat and video communication tools, now available with extreme ease but with the same reliability, thanks to the Internet. You just need to touch a small button and within a fraction of a second, you can send a message or make a call.What lies behind all this?Nothing other than Computer Networks........Learning how computers connect together is not necessarily intended only for professionals.By reading this book you will no longer be considered as a training novice in this field and that is for sure.Networking for beginners is an easy and complete guide for those beginners willing to know the basics of networking with no high-level paradigms.This book will explain to you in a simple way: - How the internet works and what are the basic networking concepts;- what are the different types of networking;- what are the networking levels, layers and protocols and why they are needed;- Interesting final notes on machine learning and on other new crucial technologies.Ready to connect?Learn the networking basics in a simple way, scroll up to this page and order your copy!

9 特價338
立即代訂
下次再買

High Performance Computing

Heike,Jagode  著
Springer 出版
2020/10/24 出版

This book constitutes the refereed post-conference proceedings of 10 workshops held at the 35th International ISC High Performance 2020 Conference, in Frankfurt, Germany, in June 2020: First Workshop on Compiler-assisted Correctness Checking and Performance Optimization for HPC (C3PO); First International Workshop on the Application of Machine Learning Techniques to Computational Fluid Dynamics Simulations and Analysis (CFDML); HPC I/O in the Data Center Workshop (HPC-IODC); First Workshop \Machine Learning on HPC Systems" (MLHPCS); First International Workshop on Monitoring and Data Analytics (MODA); 15th Workshop on Virtualization in High-Performance Cloud Computing (VHPC). The 25 full papers included in this volume were carefully reviewed and selected. They cover all aspects of research, development, and application of large-scale, high performance experimental and commercial systems. Topics include high-performance computing (HPC), computer architecture and hardware, programming models, system software, performance analysis and modeling, compiler analysis and optimization techniques, software sustainability, scientific applications, deep learning.

9 特價4175
立即代訂
下次再買

Practical Cybersecurity Architecture

Ed,Moyle  著
Packt 出版
2020/10/23 出版

Plan and design robust security architectures to secure your organization's technology landscape and the applications you developKey FeaturesLeverage practical use cases to successfully architect complex security structuresLearn risk assessment methodologies for the cloud, networks, and connected devicesUnderstand cybersecurity architecture to implement effective solutions in medium-to-large enterprisesBook descriptionCybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization.With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs.By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.What You Will LearnExplore ways to create your own architectures and analyze those from othersUnderstand strategies for creating architectures for environments and applicationsDiscover approaches to documentation using repeatable approaches and toolsDelve into communication techniques for designs, goals, and requirementsFocus on implementation strategies for designs that help reduce riskBecome well-versed with methods to apply architectural discipline to your organizationWho this book is forIf you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. This includes security practitioners, technology governance practitioners, systems auditors, and software developers invested in keeping their organizations secure. If you're new to cybersecurity architecture, the book takes you through the process step by step; for those who already work in the field and have some experience, the book presents strategies and techniques that will help them develop their skills further.

9 特價2753
立即代訂
下次再買

Create Your Own Website

Ingram 出版
2020/10/23 出版

Learn how to create your website with HTML, CSS and JavaScriptYou want to learn how to create a website. This book will guide you from the very beginning, from not knowing how to open the coding program to a website that is online and can be accessed from your mobile phone. Many programming books are dry and boring. This book, on the other hand, is written in a very understandable language. It is complete and can be used as a repertoire for your journey to create your website.- Introduction to HTML & CSS in an understandable way - accessible for students, hobbyists and professionals- Lots of examples and illustrations with bonus exercises- Hand-holding until the website is online!After reading this book you will wish that other topics are explained in such a simple way.

9 特價1368
立即代訂
下次再買

Security Standardisation Research

Springer 出版
2020/10/20 出版

This book constitutes the refereed proceedings of the 6th International Conference on Security Standardisation Research, SSR 2020, held in London, UK, in November 2020.*The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards. * The conference was held virtually due to the COVID-19 pandemic.

9 特價2870
立即代訂
下次再買

Analysis and Design of a Modern SCADA System

Fajer,Fadhil  著
Ingram 出版
2020/10/20 出版

(SCADA) systems play an important role in enhancing industrial and automation systems. This book presents planning, design, and analysis procedure of a modern SCADA system for the purpose of electrical power distribution in Nineveh city. The procedure followed includes; suggesting a suitable wired network (Ethernet) topology to connect the system using cost-reliability optimization algorithm. Then the system is designed using Wireless Mesh Networking (WMN) network (and DSR as one of its protocols) as a wireless backup network in case of any server failure of the network system. The OPNET package is used as a simulation tool to build the different models which reflect real working conditions From this procedure, an optimum SCADA system is suggested taking into account all the necessary parameters.

9 特價3068
立即代訂
下次再買

Shue’s, CompTIA Security+, Exam SY0-601, Study Supplement

Ingram 出版
2020/10/19 出版
9 特價1167
立即代訂
下次再買

Splunk Certified Study Guide

Deep,Mehta  著
Apress 出版
2020/10/19 出版

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field extraction, field aliases and macros, and Splunk tags. You will be able to make your own data model and prepare an advanced dashboard in Splunk.In the second part, you will explore the Splunk Admin certification. There will be in-depth coverage of Splunk licenses and user role management, and how to configure Splunk forwarders, indexer clustering, and the security policy of Splunk. You'll also explore advanced data input options in Splunk as well as .conf file merging logic, btool, various attributes, stanza types, editing advanced data inputs through the .conf file, and various other types of .conf file in Splunk.The concluding part covers the advanced topics of the Splunk Admin certification. You will also learn to troubleshoot Splunk and to manage existing Splunk infrastructure. You will understand how to configure search head, multi-site indexer clustering, and search peers besides exploring how to troubleshoot Splunk Enterprise using the monitoring console and matrix.log. This part will also include search issues and configuration issues. You will learn to deploy an app through a deployment server on your client's instance, create a server class, and carry out load balancing, socks proxy, and indexer discovery.By the end of the Splunk Certified Study Guide, you will have learned how to manage resources in Splunk and how to use REST API services for Splunk. This section also explains how to set up Splunk Enterprise on the AWS platform and some of the best practices to make them work efficiently together.The book offers multiple choice question tests for each part that will help you better prepare for the exam.What You Will LearnStudy to pass the Splunk User, Power User, and Admin certificate examsImplement and manage Splunk multi-site clusteringDesign, implement, and manage a complex Splunk Enterprise solutionMaster the roles of Splunk Admin and troubleshootingConfigure Splunk using AWSWho This Book Is For People looking to pass the User, Power User, and Enterprise Admin exams. It is also useful for Splunk administrators and support engineers for managing an existing deployment.

9 特價1881
立即代訂
下次再買

Bitcoin begreifen

Ingram 出版
2020/10/18 出版

Grokking Bitcoin, NOTE: the paperback book is Black & white, The hard cover is in colour. Endlich ist das beste Buch 羹ber die technischen Grundlagen von Bitcoin auch in deutscher Sprache verf羹gbar. Jetzt kann jeder verstehen, was Bitcoin so einzigartig macht, worauf die Architekturentscheidungen basieren, wozu sie dienen und wie sie umgesetzt wurden. Anhand einfach nachvollziehbarer Analogien erweitert der Autor Schritt f羹r Schritt ein per Kassenbuch gef羹hrtes Gutscheinsystem um immer mehr Eigenschaften, die f羹r ein vollst瓣ndiges, unzensierbares Geldsystem ben繹tigt werden. Dabei erkl瓣rt er mit gro?er Pr瓣zision, und f羹r Laien deswegen gut verst瓣ndlich, all das, was man schon immer 羹ber Bitcoin wissen wollte. Am Ende wird sich das Kalkulationsblatt zum vollst瓣ndigen Bitcoin-System gemausert haben, und der Leser hat dabei jeden einzelnen Schritt nachvollziehen k繹nnen. Von der Problemstellung, den L繹sungsalternativen, der gew瓣hlten L繹sung, einschlie?lich Begr羹ndung, zur tats瓣chlichen Umsetzung. ?ber 480 Abbildungen und ein ausgefeilter didaktischer Ansatz machen dieses Werk zur idealen, leicht verst瓣ndlichen und dennoch kompetenten Quelle f羹r jeden, der Bitcoin wirklich verstehen will.

9 特價1080
立即代訂
下次再買
頁數74/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing