Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Software-Defined Data Infrastructure Essentials
  • Language: en
  • Pages: 732

Software-Defined Data Infrastructure Essentials

  • Type: Book
  • -
  • Published: 2017-06-14
  • -
  • Publisher: CRC Press

Software-Defined Data Infrastructures Essentials provides fundamental coverage of physical, cloud, converged, and virtual server storage I/O networking technologies, trends, tools, techniques, and tradecraft skills. From webscale, software-defined, containers, database, key-value store, cloud, and enterprise to small or medium-size business, the book is filled with techniques, and tips to help develop or refine your server storage I/O hardware, software, and services skills. Whether you are new to data infrastructures or a seasoned pro, you will find this comprehensive reference indispensable for gaining as well as expanding experience with technologies, tools, techniques, and trends. We had...

Vulnerability Management
  • Language: en
  • Pages: 330

Vulnerability Management

  • Type: Book
  • -
  • Published: 2019-05-31
  • -
  • Publisher: CRC Press

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often c...

Bitwise
  • Language: en
  • Pages: 297

Bitwise

  • Type: Book
  • -
  • Published: 2018-08-28
  • -
  • Publisher: Vintage

An exhilarating, elegant memoir and a significant polemic on how computers and algorithms shape our understanding of the world and of who we are Bitwise is a wondrous ode to the computer lan­guages and codes that captured technologist David Auerbach’s imagination. With a philoso­pher’s sense of inquiry, Auerbach recounts his childhood spent drawing ferns with the pro­gramming language Logo on the Apple IIe, his adventures in early text-based video games, his education as an engineer, and his contribu­tions to instant messaging technology devel­oped for Microsoft and the servers powering Google’s data stores. A lifelong student of the systems that shape our lives—from the psy­ch...

The Practical Guide to HIPAA Privacy and Security Compliance
  • Language: en
  • Pages: 491

The Practical Guide to HIPAA Privacy and Security Compliance

  • Type: Book
  • -
  • Published: 2003-11-24
  • -
  • Publisher: CRC Press

HIPAA is very complex. So are the privacy and security initiatives that must occur to reach and maintain HIPAA compliance. Organizations need a quick, concise reference in order to meet HIPAA requirements and maintain ongoing compliance. The Practical Guide to HIPAA Privacy and Security Compliance is a one-stop resource for real-world HIPAA

Demanding Development
  • Language: en
  • Pages: 331

Demanding Development

Explains the uneven success of India's slum dwellers in demanding and securing essential public services from the state.

Official (ISC)2 Guide to the CISSP CBK
  • Language: en
  • Pages: 1108

Official (ISC)2 Guide to the CISSP CBK

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry's first and only CBK, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK conti

Bad Man
  • Language: en
  • Pages: 428

Bad Man

  • Type: Book
  • -
  • Published: 2018-08-07
  • -
  • Publisher: Anchor

Reddit horror sensation Dathan Auerbach delivers a devilishly dark novel about a young boy who goes missing, and the brother who won't stop looking for him. Eric disappeared when he was three years old. Ben looked away for only a second at the grocery store, but that was all it took. His brother was gone. Vanished right into the sticky air of the Florida Panhandle. They say you've got only a couple days to find a missing person. Forty-eight hours to conduct searches, knock on doors, and talk to witnesses. Two days to tear the world apart if there's any chance of putting yours back together. That's your window. That window closed five years ago, leaving Ben's life in ruins. He still looks for...

Official (ISC)2 Guide to the CISSP CBK
  • Language: en
  • Pages: 1118

Official (ISC)2 Guide to the CISSP CBK

  • Type: Book
  • -
  • Published: 2006-11-14
  • -
  • Publisher: CRC Press

The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2’s education and certification programs. Unique and exceptionally thorough, the Official (ISC)2® Guide to the CISSP®CBK®provides a better understanding of the CISSP CBK — a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, so...

RFID in the Supply Chain
  • Language: en
  • Pages: 452

RFID in the Supply Chain

  • Type: Book
  • -
  • Published: 2006-11-20
  • -
  • Publisher: CRC Press

Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness. Helping you bring your organization into the future, RFID in the Supply Ch

Catalog of Copyright Entries. Third Series
  • Language: en
  • Pages: 1862

Catalog of Copyright Entries. Third Series

description not available right now.