• Welcome!
Total books

Communicaion and Telecommunication

Sort by
Pentaho for Big Data Analytics

Pentaho accelerates the realization of value from big data with the most complete solution for big data analytics and data integration. The real power of big data analytics is the abstraction between data and analytics. Data can be distributed across the cluster in various formats, and the analytics platform should have the capability to talk to different heterogeneous data stores and fetch the filtered data to enrich its value.

Introducing Jakarta EE CDI: Contexts and Dependency Injection for Enterprise Java Development

Discover the Jakarta EE Contexts and Dependency Injection (CDI 2.0) framework which helps you write better code through the use of well-defined enterprise Java-based components and beans (EJBs). If you have ever wanted to write clean Java EE code, this short book is your best guide for doing so: you will pick up valuable tips along the way from your author's years of experience teaching and coding. Introducing Jakarta EE CDI covers CDI 2.0 in detail and equips you with the theoretical underpinnings of Java EE, now Jakarta EE.

Hands-On Cloud-Native Microservices with Jakarta EE

Businesses today are evolving rapidly, and developers now face the challenge of building applications that are resilient, flexible, and native to the cloud. To achieve this, you'll need to be aware of the environment, tools, and resources that you're coding against.

Big Java: Early Objects, 6th Edition

Cay Horstmann's sixth edition of Big Java, Early Objects provides an approachable introduction to fundamental programming techniques and design skills, helping students master basic concepts and become competent coders.

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach

Troubleshooting-and-Maintaining-Your-PC-All-in-One-For-Dummies-3rd-Edition

Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you.

Practical Windows Forensics
Practical Windows Forensics Sented by Sarah Gerdes

Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade your existing knowledge.

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

Mastering Mobile Forensics
Mastering Mobile Forensics Sented by Rebecca

A mastering guide to help you overcome the roadblocks you face when dealing with mobile forensics Excel at the art of extracting data, recovering deleted data, bypassing screen locks, and much more Get best practices to how to collect and analyze mobile device data and accurately document your investigations

Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks

Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers with CUDA-capable video display cards.

Cyber Security for You
Cyber Security for You Sented by Steve Bark

At our company, we research cyber hacking attacks all over the world to see if our server protection product will protect against the techniques used in the attack. In the course of this research, one important conclusion kept leaping out: MOST HACKING ATTEMPTS ARE PREVENTABLE FOR LITTLE COST AND SOME KNOWLEDGE.

Cisco Secure Internet Security Solutions (Cisco Press Core Series)

At present, no available publication deals with Internet security from a Cisco perspective utilizing the Cisco Secure product family. Cisco Secure Internet Security Solutions covers the basics of Internet security and then concentrates on each member of the Cisco Secure product family, providing a rich explanation with examples of the preferred configurations required for securing Internet connections

Cisco LAN Switching Configuration Handbook

Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE® No. 6108 David Jansen, CCIE No. 5952 David Hucaby, CCIE No. 4594 Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series of chapters that provide design and configuration guidelines. Each chapter starts with common design overviews and then describes the configuration of management features. Coverage includes Layer 2, Layer 3, multicast, high availability, and traffic management configurations.

Sort by