299 rezultatov
-
-
Architecting the Cloud(2014) KAVIS, MICHAEL J.An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud60,93 €
KAVIS, MICHAEL J.
Architecting the Cloud
An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud
Zaloga po trgovinah
Rezultati:
-
Juniper MX Series 2e(2016) HANKS, DOUGLAS,REYNOLDS, HARRYThis revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX feature69,91 €
HANKS, DOUGLAS,REYNOLDS, HARRY
Juniper MX Series 2e
This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX feature
Zaloga po trgovinah
Rezultati:
-
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame50,52 €
O'CONNOR, TJ
Violent Python
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame
Zaloga po trgovinah
Rezultati:
-
-
-
Practical Microservices(2020) GARAFOLO, ETHANRoll up your sleeves with real projects and learn the most important concepts of evented architectures. You'll have your own deployable, testable project and a direction for where to go next51,40 €
GARAFOLO, ETHAN
Practical Microservices
Roll up your sleeves with real projects and learn the most important concepts of evented architectures. You'll have your own deployable, testable project and a direction for where to go next
Zaloga po trgovinah
Rezultati:
-
Lab Manual for Nelson/Phillips/Steuart's Guide to Computer Forensics and Investigations, 5th(2015) BLITZ, ANDREW62,46 €
BLITZ, ANDREW
Lab Manual for Nelson/Phillips/Steuart's Guide to Computer Forensics and Investigations, 5th
Zaloga po trgovinah
Rezultati:
-
Cabling: The Complete Guide to Copper and Fiber-Optic Networking(2014) ANDREW OLIVIEROVezava: Mehka120,81 €
ANDREW OLIVIERO
Cabling: The Complete Guide to Copper and Fiber-Optic Networking
Zaloga po trgovinah
Rezultati:
-
IT Disaster Recovery Planning For Dummies(2008) GREGORY, PETER H. (AT&T WIRELESS SERVICES, WOODINVILLE, WASHINGTON)If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off.24,11 €
GREGORY, PETER H. (AT&T WIRELESS SERVICES, WOODINVILLE, WASHINGTON)
IT Disaster Recovery Planning For Dummies
If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off.
Zaloga po trgovinah
Rezultati:
-
Wide-area Data Network Performance Engineering(1999) COLE, ROBERT,RAMASWAMY, RAVIA guide to wide-area data network performance engineering, discussing the skills needed to design a router network carrying a variety of traffic over frame relay devices. It covers routers, protocols, applications, performance engineering, network managem8,61 €
COLE, ROBERT,RAMASWAMY, RAVI
Wide-area Data Network Performance Engineering
A guide to wide-area data network performance engineering, discussing the skills needed to design a router network carrying a variety of traffic over frame relay devices. It covers routers, protocols, applications, performance engineering, network managem
Zaloga po trgovinah
Rezultati:
-
Challenges for European Innovation Policy Cohesion and Excellence from a Schumpeterian Perspective(2011) SLAVO RADOSEVICVezava: Trda84,07 €
SLAVO RADOSEVIC
Challenges for European Innovation Policy Cohesion and Excellence from a Schumpeterian Perspective
Zaloga po trgovinah
Rezultati:
-
-
-
TCP / IP For Dummies(2009) LEIDEN, CANDACE (THE CARDINAL SOFTWARE GROUP, LLC, WINCHESTER, MASSACHUSETTS),WILENSKY, MARSHALL (LOTUS DEVELOPMENT CORP., WINCHESTER, MASSACHUSETTS)Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.29,85 €
LEIDEN, CANDACE (THE CARDINAL SOFTWARE GROUP, LLC, WINCHESTER, MASSACHUSETTS),WILENSKY, MARSHALL (LOTUS DEVELOPMENT CORP., WINCHESTER, MASSACHUSETTS)
TCP / IP For Dummies
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.
Zaloga po trgovinah
Rezultati:
-
-
Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENSVezava: Mehka64,13 €
JASON LUTTGENS
Incident Response & Computer Forensics, Third Edition
Zaloga po trgovinah
Rezultati:
-
Basics of Web Design: Pearson New International Edition: Html5 & Css3(2013) TERRY FELKE MORRISVezava: Mehka136,48 €
TERRY FELKE MORRIS
Basics of Web Design: Pearson New International Edition: Html5 & Css3
Zaloga po trgovinah
Rezultati:
-
-
Information Security Risk Assessment Toolkit(2012) TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a55,11 €
TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)
Information Security Risk Assessment Toolkit
Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a
Zaloga po trgovinah
Rezultati: