апаратне забезпечення. модернізація і ремонт

  1. G

    Придбаний Книга IAPP CIPP \u002F US Certified Information Privacy Professional Study Guide (Джо Шеллі)

    Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the current CIPP exam for 2024-2025! Information privacy has become a critical and central concern for small and large...
  2. G

    Придбаний Книга Raspberry Pi 3 in Easy Steps (Майк МакГрат)

    The Raspberry Pi is an inexpensive programmable credit-card sized computer that plugs into your TV and a keyboard. It can be used for many of the things that your PC does, like spreadsheets, word-processing and playing games, but its real purpose is to inspire children (and adults) to learn how...
  3. G

    Придбаний Книга PgMP® Exam Test Preparation: Test Questions, Practice Tests, and Simulated Exams (Джинджер Левін)

    In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study guide also contains flashcards for learning terms. This book is current with The Standard for Program Management, Fourth Edition, and its author is the second person in the...
  4. G

    Придбаний Книга Kerberos (Джейсон Гарман)

    Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the large or small. Kerberos makes your network more secure and more convenient for users by...
  5. G

    Придбаний Книга MCSA Guide to Networking with Windows Server® 2016, Exam 70-741 (Грег Томшо)

    Packed with a wealth of hands-on activities, NETWORKING WITH WINDOWS SERVER® 2016, EXAM 70-741 empowers you to successfully pass the MCSE/MCSA certification exam while also equipping you to successfully face the real challenges that you will encounter as a Microsoft® networking professional...
  6. G

    Придбаний Книга CompTIA Cloud+ Guide to Cloud Computing (Джилл Вест)

    West's COMPTIA CLOUD+ GUIDE TO CLOUD COMPUTING, 2nd Edition, prepares you for certification exam and career success. Fully updated content maps to objectives of the CompTIA Cloud+ (CVO-003) exam, which now has less emphasis on physical host configuration and more emphasis on cloud...
  7. G

    Придбаний Книга CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-002) (Марк Чампа)

    Develop the advanced cybersecurity knowledge and skills for success on the latest CompTIA Cybersecurity Analyst certification exam (CySA+ CS0-002) with Ciampa's COMPTIA CYSA+ GUIDE TO CYBERSECURITY ANALYST (CS0-002), 2nd Edition. Updated, "stair-stepped" content builds on material you've...
  8. G

    Придбаний Книга 100 SQL Server Mistakes and How to Avoid Them (Пітер Картер)

    All the mistakes you might make with SQL Server—and how to avoid them! 100 SQL Server Mistakes and How To Avoid Them primes you on the pitfalls database professionals often fall into—from administration to development, availability, and security. You'll dodge common mistakes that slow down your...
  9. G

    Придбаний Книга Logs and Telemetry (Філ Вілкінс)

    Build cloud native observability pipelines with minimal footprints and high-performance throughput—all with Fluent Bit, Kubernetes, and your favorite visualization and analytics tools. Logs and Telemetry is an all-practical guide to monitoring both cloud-native and traditional environments with...
  10. G

    Придбаний Книга Windows 11 All-in-One For Dummies, 2nd Edition (Ципріян Адріан Русен)

    A deep dive into the Windows, for beginners and advanced users alike Windows 11 All-in-One For Dummies, 2nd Edition is your most thorough source of information on the world's #1 computer operating system. This 800+ page reference guides you through the art of navigating the Windows interface...
  11. G

    Придбаний Книга Securing Enterprise Networks with Cisco Meraki (Райан Чейні)

    Securing Enterprise Networks with Cisco Meraki Discover the Power of Cisco Meraki Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks. Cisco Meraki offers a unique, cloud-managed IT platform that integrates...
  12. G

    Придбаний Книга From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 3) (Аль Марчелла)

    In Book 3, fifth and sixth graders are maturing, becoming more independent, and online activities are second nature. From Street‑smart to Web‑wise®: A Cyber Safety Training Manual Built for Teachers and Designed for Children isn’t just another book — it’s a passionate call to action for...
  13. G

    Придбаний Книга CCNA 200-301 Hands-on Mastery with Packet Tracer (Ентоні Секейра)

    The CCNA 200-301 exam will challenge you to focus not only on the theory of a technology but the ability to demonstrate mastery of configuration, verification, and troubleshooting. In CCNA 200-301 Hands-on Mastery with Packet Tracer, you will be guided through the required configuration...
  14. G

    Придбаний Книга Automate Your Home Using Go: Build a Personal Data Center with Raspberry Pi, Docker, Prometheus, and Grafana (Майк Райлі)

    Take control of your home and your data with the power of the Go programming language. Build extraordinary and robust home automation solutions that rival much more expensive, closed commercial alternatives, using the same tools found in high-end enterprise computing environments. Best-selling...
  15. G

    Придбаний Книга Digital Marketing: Strategy, Planning & Disruption (Еннмарі Хенлон)

    Your complete and accessible guide to all aspects of digital marketing, from tools and channels to strategy, planning and marketing management. This fully updated third edition explores the application of AI in marketing, how digital disruption leads to transformation, and the Metaverse and its...
  16. G

    Придбаний Книга Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture (Гері Арчер)

    Формат: Скан PDf https://www.yakaboo.ua/ua/cloud-native-data-security-with-oauth-a-scalable-zero-trust-architecture.html
  17. G

    Придбаний Книга Professional Networking For Dummies (Донна Фішер)

    Are you putting your best foot forward in meetings? Are you connecting with the right people at functions? Throughout your life, you will find yourself in situations where professional networking will help you get to where you want to go. Whatever your strengths or weaknesses are, you can always...
  18. G

    Придбаний Книга Engineering Networks for Synchronization, CCS 7, and ISDN: Standards, Protocols, Planning and Testing (П. К. Бхатнагар)

    In view of the extensive development of CCS 7 and fast-paced growth of ISDN in telecommunication networks throughout the world, this valuable resource serves as a timely reference and guide. Practical and up-to-date, Engineering Networks for Synchronization, CCS 7, and ISDN provides in-depth...
  19. G

    Придбаний Книга Optimization of Computer Networks: Modeling and Algorithms: A Hands-On Approach (Пабло Павон Маріньо)

    This book covers the design and optimization of computer networks applying a rigorous optimization methodology, applicable to any network technology. It is organized into two parts. In Part 1 the reader will learn how to model network problems appearing in computer networks as optimization...
  20. G

    Придбаний Книга Designing Embedded Systems and the Internet of Things (IoT) with the ARM mbed (Перрі Сяо)

    A comprehensive and accessible introduction to the development of embedded systems and Internet of Things devices using ARM mbed Designing Embedded Systems and the Internet of Things (IoT) with the ARM mbed offers an accessible guide to the development of ARM mbed and includes a range of topics...
  21. G

    Придбаний Книга Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English (Денні Черрі)

    Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to...
  22. G

    Придбаний Книга Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations (Ніранджан Редді)

    Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for...
  23. G

    Придбаний Книга IPTV Security: Protecting High-Value Digital Contents (Девід Г. Рамірес)

    Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration...
  24. G

    Придбаний Книга Mastering Unix Shell Scripting: Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus (Рендал К. Майкл)

    UNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting solution. Covering Bash, Bourne, and Korn...
  25. G

    Придбаний Книга GCIH GIAC Certified Incident Handler All-in-One Exam Guide (Нік Мітропулос)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam...
  26. G

    Придбаний Книга Networking Essentials: A CompTIA Network+ N10-008 Textbook (Джеффрі С. Біслі)

    Thoroughly updated to reflect the CompTIA® Network+ N10-008 exam, Networking Essentials, Sixth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either...
  27. G

    Придбаний Книга Over-the-Road Wireless For Dummies (Е. Філ Хейлі)

    Do you roam the road making a living, or are you enjoying the nomadic life of a retiree with a motor home? Either way, life goes on no matter where you're hanging your hat tonight. Bills still need to be paid, grandchildren grow up way too fast, and you've gotten pretty dependent on your e-mail...
  28. G

    Придбаний Книга Managing Projects in Telecommunication Services (Мостафа Хашем Шериф)

    Effective project management tailored to the needs of the telecommunications industry "In our rapidly changing world, the information and communication technologies and services have an immense impact on virtually all aspects of our lives. . . . With his deep understanding of the...
  29. G

    Придбаний Книга Fiber to the Home: The New Empowerment (Пол Е. Грін)

    A compelling treatment of FTTH Written by telecommunications pioneer Paul Green Jr., Fiber to the Home is a comprehensive examination of the technical and social implications of fiber to the home (FTTH), the technology that extends the current fiber optic backbone to optically connect it...
  30. G

    Придбаний Книга Raspberry Pi Electronics Projects for the Evil Genius (Дональд Норріс)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Ten brand new, hands-on DIY projects for the Raspberry Pi! This fully illustrated guide shows how to...
  31. G

    Придбаний Книга Reactive Programming with Angular and ngrx: Learn to Harness the Power of Reactive Programming with RxJS and ngrx Extensions (Орен Фархі)

    Manage your Angular development using Reactive programming. Growing in popularity and now an essential part of any professional web developer's toolkit, Reactive programming can enrich your development and make your code more efficient. Featuring a core application to explore and build yourself...
  32. G

    Придбаний Книга Web Server Programming (Ніл Грей)

    When the web transitioned from a publishing to an interactive e-commerce medium, standardised web-browsers entered widespread use and developers were able to rely on a relatively stable client component. Since then, server-side developments have blossomed and resulted in considerable ease of...
  33. G

    Придбаний Книга Elements of Network Protocol Design (Мохамед Г. Гауда)

    While we are all becoming familiar with the Internet, which uses the Transfer Control Protocol/Internet Protocol (TCP/IP), more and more additions and changes emerge every year, including protocols that support multimedia, encryption, and other methods of secure data transfer. This book focuses...
  34. G

    Придбаний Книга Enterprise Software Architecture and Design: Entities, Services, and Resources (Домінік Дуґґан)

    This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the "big picture". This book discusses SOA from the low-level perspective of middleware, various XML-based technologies, and basic service design...
  35. G

    Придбаний Книга Ad Hoc Networks: Routing, Qos and Optimization (Мунір Фріха)

    This work presents ad hoc networks and their characteristics. It explains a new protocol of routing with QoS as well as its implementation in a network simulator and compares it with the existing protocols. The book discusses the principle of the load balancing, treats the approaches of...
  36. G

    Придбаний Книга Embedded SoPC Design with Nios II Processor and Verilog Examples (Понг П. Чу)

    Explores the unique hardware programmability of FPGA-based embedded systems, using a learn-by-doing approach to introduce the concepts and techniques for embedded SoPC design with Verilog An SoPC (system on a programmable chip) integrates a processor, memory modules, I/O peripherals, and custom...
  37. G

    Придбаний Книга Connected Services: A Guide to the Internet Technologies Shaping the Future of Mobile Services and Operators (Пол Голдінг)

    "Connected Services is a must-read for telco strategists who need to get up to speed on how the world of software and the web 2. 0 works." —Andreas Constantinou, Research Director, VisionMobile "This book is a must read for those charged with leading innovation in a world of connected services...
  38. G

    Придбаний Книга Computer, Network, Software, and Hardware Engineering with Applications (Норман Ф. Шнейдевінд)

    There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on...
  39. G

    Придбаний Книга Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks (Паоло Санті)

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of...
  40. G

    Придбаний Книга The Cloud Computing Book: The Future of Computing Explained (Дуглас Комер)

    This latest textbook from bestselling author, Douglas E. Comer, is a class-tested book providing a comprehensive introduction to cloud computing. Focusing on concepts and principles, rather than commercial offerings by cloud providers and vendors, The Cloud Computing Book: The Future of...
  41. G

    Придбаний Книга Digital Signal Processing for Wireless Communication using Matlab (Е.С. Гопі)

    The updated book presents Matlab illustrations on various digital signal processing (DSP) techniques such as random process, time varying wireless system model, and detection and estimation theory used in wireless communication. The book also covers recent wireless techniques like OFDM, massive...
  42. G

    Придбаний Книга Introduction to Healthcare Information: Enabling Technologies (Раймонд Генсінгер)

    Introduction to Health Care Management is a concise, reader-friendly, introductory healthcare management book that covers a wide variety of healthcare settings, from hospitals to nursing homes and clinics. Filled with examples to engage the reader's imagination, the important issues in...
  43. G

    Придбаний Книга Mobile and Wireless Communications with Practical Use-Case Scenarios (Рамона Трестіан)

    The growing popularity of advanced multimedia-rich applications along with the increasing affordability of high-end smart mobile devices has led to a massive growth in mobile data traffic that puts significant pressure on the underlying network technology. However, no single network technology...
  44. G

    Придбаний Книга Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux (Дерек Моллой)

    Expand Raspberry Pi capabilities with fundamental engineering principles Exploring Raspberry Pi is the innovators guide to bringing Raspberry Pi to life. This book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll...
  45. G

    Придбаний Книга Information Systems: What Every Business Student Needs to Know, Second Edition (Єфрем Г. Маллах)

    Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key "Take-Aways"...
  46. G

    Придбаний Книга Program Governance (Мухаммад Ехсан Хан)

    Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need. Program Governance...
  47. G

    Придбаний Книга Principles of Synchronous Digital Hierarchy (Раджеш Кумар Джайн)

    The book presents the current standards of digital multiplexing, called synchronous digital hierarchy, including analog multiplexing technologies. It is aimed at telecommunication professionals who want to develop an understanding of digital multiplexing and synchronous digital hierarchy, in...
  48. G

    Придбаний Книга Email (Ренді Маламуд)

    To examine our emails is to examine our lives: our inboxes are anthropological goldmines, waiting to be plumbed and probed for the expansive cultural, ethical, behavioral lessons they hold. Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things...
  49. G

    Придбаний Книга Capturing Upside Risk: Finding and Managing Opportunities in Projects (Девід Хіллсон)

    With more than three decades of experience as a thought-leader and expert practitioner, PMI Fellow Dr. David Hillson shares practical insight into how upside risks can be identified, assessed, and managed as opportunities. After reviewing the benefits of identifying opportunities, the book steps...
  50. G

    Придбаний Книга Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services (Філіпп Абдулайе)

    Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye...
  51. G

    Придбаний Книга Practical Cryptology and Web Security (П. К. Юень)

    A hands-on, comprehensive guide, which gives students a practical insight into all aspects of web security and cryptography. Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing...
  52. G

    Придбаний Книга Information Security Policies, Procedures, and Standards: A Practitioner's Reference (Дуглас Дж. Лендолл)

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the...
  53. G

    Придбаний Книга Exploring BeagleBone: Tools and Techniques for Building with Embedded Linux (Дерек Моллой)

    In-depth instruction and practical techniques for building with the BeagleBone embedded Linux platform Exploring BeagleBone is a hands-on guide to bringing gadgets, gizmos, and robots to life using the popular BeagleBone embedded Linux platform. Comprehensive content and deep detail provide more...
  54. G

    Придбаний Книга People-Centric Skills: Interpersonal and Communication Skills for Financial Professionals (Денні М. Голдберг)

    Use your interpersonal and communication skills as a financial professional to work successfully with clients Embark on a journey to further develop your career when you read People-Centric Skills: Interpersonal and Communication Skills for Financial Professionals, 2nd Edition. Business leaders...
  55. G

    Придбаний Книга The CISO’s Transformation: Security Leadership in a High Threat Landscape (Радж Бадвар)

    The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge...
  56. G

    Придбаний Книга Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices (Е. Брайан Карне)

    Explores and analyzes past and current technologies and trends in multimedia communication Digital natives—those persons born in the digital age—have an ever-widening range of wireless-enabled devices at their disposal. They are the drivers of multimedia communications, continually seeking out...
  57. G

    Придбаний Книга Enterprise Security Architecture: A Business-Driven Approach (Ніколас Шервуд)

    Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a framework for developing and...
  58. G

    Придбаний Книга Autonomic Intelligence Evolved Cooperative Networking (Міхал Водчак)

    Autonomic Intelligence Evolved Cooperative Networking offers a comprehensive advancement of the state-of-the art technological developments in the fields of Cooperative Networking and Autonomic Computing. Based on his track record in industrial standardisation, as well as academic and applied...
  59. G

    Придбаний Книга Microsoft Orleans for Developers: Build Cloud-Native, High-Scale, Distributed Systems in .NET Using Orleans (Річард Естбері)

    Use a simple programming model and the .NET language of your choice to build large distributed systems. This book teaches you the Microsoft Orleans framework. Even well-versed professional software developers with expertise in C# (or another language) find themselves unequipped to meet the...
  60. G

    Придбаний Книга Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders (Рене Тарун)

    Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of...
  61. G

    Придбаний Книга Blockchain Systems and Communication Networks: From Concepts to Implementation (Мубашир Хусейн Рехмані)

    This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks. It covers blockchain applications, algorithms, architectures, design and implementation, and security and...
  62. G

    Придбаний Книга The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms (Радж Бадвар)

    This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this...
  63. G

    Придбаний Книга The IoT Product Manager: A Handbook for Engineers, Data Analysts, and Other IT Professionals (Падмарадж Нідагунді)

    Enhance your product management skills and set yourself apart from other product managers working in the IoT industry. This book shows you how to navigate through the world of small and Edge devices to successfully launch and monitor products connected together to make smart environments...
  64. G

    Придбаний Книга Reliable Communications within Cyber-Physical Systems Using the Internet (RC4CPS) (Мохаммад Елаттар)

    This thesis describes the research done regarding communication reliability when using the Internet to realize the communications for cyber-physical systems (CPSs). In a nutshell, the book first presents the obtained results from real-world measurements describing the reliability of today’s...
  65. G

    Придбаний Книга Cloud Computing (Наян Б. Рупарелія)

    Формат: Скан PDf https://www.yakaboo.ua/ua/cloud-computing.html
  66. G

    Придбаний Книга Juniper MX Series 2e (Дуглас Хенкс)

    Discover why routers in the Juniper MX Series-with their advanced feature sets and record-breaking scale-are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet...
  67. G

    Придбаний Книга Content Delivery Networks: Fundamentals, Design, and Evolution (Дом Робінсон)

    The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and to ensure high-quality content delivery that fully...
  68. G

    Придбаний Книга Principles of Spread-Spectrum Communication Systems (Дон Торрієрі)

    This textbook, now in its 5th edition, provides updated state-of-the-art coverage of spread-spectrum communication systems with new applications throughout the book. In this edition, the author extends sections with more comprehensive details about many topics. Some of the more complex sections...
  69. G

    Придбаний Книга Internet of Things: Concepts and System Design (Мілан Міленкович)

    This comprehensive overview of IoT systems architecture includes in-depth treatment of all key components: edge, communications, cloud, data processing, security, management, and uses. Internet of Things: Concepts and System Design provides a reference and foundation for students and...
  70. G

    Придбаний Книга The Cloud Computing Book: The Future of Computing Explained (Дуглас Комер)

    This latest textbook from bestselling author, Douglas E. Comer, is a class-tested book providing a comprehensive introduction to cloud computing. Focusing on concepts and principles, rather than commercial offerings by cloud providers and vendors, The Cloud Computing Book: The Future of...
  71. G

    Придбаний Книга The Zero Trust Framework and Privileged Access Management (PAM) (Равіндра Дас)

    This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at...
  72. G

    Придбаний Книга Graph Spectra for Complex Networks (Піт ван Мігем)

    A concise and self-contained 2010 introduction to the theory of graph spectra and its applications to the study of complex networks. Analyzing the behavior of complex networks is an important element in the design of new man-made structures such as communication systems and biologically...
  73. G

    Придбаний Книга Graph Spectra for Complex Networks (Піт ван Мігем)

    A concise and self-contained 2010 introduction to the theory of graph spectra and its applications to the study of complex networks. Analyzing the behavior of complex networks is an important element in the design of new man-made structures such as communication systems and biologically...
  74. G

    Придбаний Книга Security of e-Systems and Computer Networks (Мохаммад Обайдат)

    Describes tools of e-security and a range of applications, including recently developed technologies like Trust management systems and biometrics-based security. E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government...
  75. G

    Придбаний Книга Computer Networks and Internets, Global Edition (Дуглас Комер)

    Appropriate for all introductory-to-intermediate courses in computer networking, the Internet, or Internet applications; students need no background in networking, operating systems, or advanced mathematics. Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour...
  76. G

    Придбаний Книга Scalability, Density, and Decision Making in Cognitive Wireless Networks (Престон Маршалл)

    Learn to integrate information and decision theory to extend network density and scaling to unprecedented levels. This cohesive treatment of cognitive radio and networking technology integrates information and decision theory to provide insight into relationships throughout all layers of...
  77. G

    Придбаний Книга Near Field Communications Technology and Applications (Майк Хендрі)

    Everything you need to know about NFC technology, its applications, implementation, common obstacles and strategies to overcome them. Whether you are a developer, engineer, researcher or student, this practical guide gives you everything you need to know about NFC technology and its...
  78. G

    Придбаний Книга The Quantum Internet: The Second Quantum Revolution (Пітер П. Роде)

    Highly interdisciplinary overview of the emerging topic of the Quantum Internet, covering current and future quantum technologies. Following the emergence of quantum computing, the subsequent quantum revolution will be that of interconnecting individual quantum computers at the global level. In...
  79. G

    Придбаний Книга Understanding Cyber Warfare and its Implications for Indian Armed Forces (Р. К. Тьягі)

    The book is divided into two parts. Part 1 deals with cyber warfare in general bringing out the unique characteristics of cyber space, the recent cyber attack on Estonia and the Stuxnet attack on Iranian Nuclear facilities, how the established Principles of War can be applied in cyberspace...
  80. G

    Придбаний Книга How to Catch a Phish: A Practical Guide to Detecting Phishing Emails (Ніколас Олес)

    Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization...
  81. G

    Придбаний Книга ITSM Value Streams: Transform opportunity into outcome (Акшай Ананд)

    ITSM Value Streams is a comprehensive guide to organizations on how to effectively utilise IT services to achieve business outcomes. It emphasizes the importance of understanding the value streams that flow through an organization and how IT services can be configured and applied to co-create...
  82. G

    Придбаний Книга Random Graphs and Complex Networks: Volume 2 (Ремко ван дер Гофстад)

    The definitive introduction to the local and global structure of random graph models for complex networks. Complex networks are key to describing the connected nature of the society that we live in. This book, the second of two volumes, describes the local structure of random graph models for...
  83. G

    Придбаний Книга Building Evolutionary Architectures: Automated Software Governance (Нил Форд)

    The software development ecosystem is constantly changing, providing a constant stream of new tools, frameworks, techniques, and paradigms. Over the past few years, incremental developments in core engineering practices for software development have created the foundations for rethinking how...
  84. G

    Придбаний Книга Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp (Ітан Коуен)

    Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization...
  85. G

    Придбаний Книга Cloud Native Data-Center Networking: Architecture, Protocols, and Tools (Дінеш Г. Датт)

    If you want to study, build, or simply validate your thinking about modern cloud native data center networks, this is your book. Whether you're pursuing a multitenant private cloud, a network for running machine learning, or an enterprise data center, author Dinesh Dutt takes you through the...
  86. G

    Придбаний Книга Linux Observability with BPF: Advanced Programming for Performance Analysis and Networking (Девід Калавера)

    Build your expertise in the BPF virtual machine in the Linux kernel with this practical guide for systems engineers. You’ll not only dive into the BPF program lifecycle but also learn to write applications that observe and modify the kernel’s behavior; inject code to monitor, trace, and securely...
  87. G

    Придбаний Книга Becoming SRE: First Steps Toward Reliability for You and Your Organization (Девід Н. Бланк-Едельман)

    Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs...
  88. G

    Придбаний Книга Guide to Network Defense and Countermeasures (Доун Вівер)

    GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis...
  89. G

    Придбаний Книга Zero Trust Networks (Даг Барт)

    Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a...
  90. G

    Придбаний Книга Cloud Computing, revised and updated edition (Наян Б. Рупарелія)

    An updated, revised, and comprehensive overview of the concepts related to cloud computing, including recent applications, innovations, and its future evolution. In this Essential Knowledge volume, Nayan B. Ruparelia provides an updated and revised version of Cloud Computing, first published in...
  91. G

    Придбаний Книга HTTP: Understanding Web Internals (Девід Гарлі)

    Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration...
  92. G

    Придбаний Книга Collectible Microcomputers (Майкл Нейдо)

    This comprehensive field guide is invaluable for identifying and pricing more than 700 microcomputers made worldwide between 1971 and 1993. It's filled with over 340 photos and up-to-date information for collectors who want to fully enjoy this rapidly emerging hobby. Featured are early hobbyist...
  93. G

    Придбаний Книга Zero Trust Networks: Building Secure Systems in Untrusted Network (Крістіна Морілло)

    This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition...
  94. G

    Придбаний Книга Flutter and Dart Cookbook: Developing Full-Stack Applications for the Cloud (Річ Роуз)

    Learn the essentials of working with Flutter and Dart to build full stack applications that meet the needs of a cloud-driven world. Together, the Flutter open source UI software development kit and the Dart programming language for client development provide a unified solution to building...
  95. G

    Придбаний Книга Nginx Cookbook: Advanced Recipes for High-Performance Load Balancing (Дерек ДеЙонге)

    NGINX is one of the most widely used web servers available today, in part because of its capabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical...
  96. G

    Придбаний Книга Graph Spectra for Complex Networks (Піт ван Мігем)

    Spectral properties of the adjacency, Laplacian and effective resistance matrices of graphs are derived and applied to complex networks. This concise and self-contained introduction builds up the spectral theory of graphs from scratch, with linear algebra and the theory of polynomials developed...
  97. G

    Придбаний Книга Multisensory Experiences: Where the senses meet technology (Карлос Веласко)

    Most of our everyday life experiences are multisensory in nature; that is, they consist of what we see, hear, feel, taste, smell, and much more. Almost any experience you can think of, such as eating a meal or going to the cinema, involves a magnificent sensory world. In recent years, many of...
  98. G

    Придбаний Книга Networking All-in-One For Dummies (Даг Лоу)

    The essentials you need to learn about networking—10 books in one! With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud...
  99. G

    Придбаний Книга Application Architecture Patterns for Web 3.0: Design Patterns and Use Cases for Modern and Secure Web3 Applications (Стефано Темпеста)

    Over the past three years, the landscape of blockchain technology has undergone remarkable transformation, extending far beyond its association with cryptocurrencies especially with the emergence of Web3 applications. Web 3.0 is built using artificial intelligence, machine learning, and the...
  100. G

    Придбаний Книга Handbook of Inclusive Knowledge Management: Ensuring Inclusivity, Diversity, and Equity in Knowledge Processing Activities (Кіміз Далкір)

    Handbook of Inclusive Knowledge Management: Ensuring Inclusivity, Diversity, and Equity in Knowledge Processing Activities examines the role that diversity, equity and inclusivity (DEI) plays in the field and discipline of knowledge management (KM). With the premise that DEI is the inclusion and...
  101. G

    Придбаний Книга Public Key Cryptosystems (Есра Бас)

    This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the...
  102. G

    Придбаний Книга Empowered or Left Behind: Use of Technology During COVID-19 (ДіДі М. Беннетт Гейл)

    Focused on the United States, this book summarizes the secondary impacts of COVID-19 due to the increased use of technology. Establishing the global response of social distancing, mandates for non-essential business, and working from home, the book centers on the disparate guidance provided...
  103. G

    Придбаний Книга Social Media and Library Services (Лоррі Мон)

    This Second Edition presents research, theory, and practical applications for social media and libraries, providing insights into the life of the social library. Readers are introduced to the features of social sites that can be leveraged to create a unique and diversified library social media...
  104. G

    Придбаний Книга PCs & Laptops For Dummies (Ден Гукін)

    A one-stop guide to making the most of your desktop PC or laptop computer PCs and Laptops For Dummies is the essential user's guide to the features your PC or laptop has to offer—and how to use them successfully. With this book as your coach, you can jump over technological hurdles with ease...
  105. G

    Придбаний Книга Information Security Management Principles (Аманда Фінч)

    In today’s technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. Written in an...
  106. G

    Придбаний Книга Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting (Рафай Балох)

    In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This book, penned by an expert in the field...
  107. G

    Придбаний Книга Business Intelligence for Telecommunications (Діпак Парік)

    Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, Business Intelligence for Telecommunications identifies those advances in both methods and technology that are being employed to inform decision-making and give...
  108. G

    Придбаний Книга Dynamical Behaviors of Multiweighted Complex Network Systems (Хуай Нін Ву)

    Highly comprehensive resource for studying neural networks, complex networks, synchronization, passivity, and associated applications Dynamical Behaviors of Multiweighted Complex Network Systems discusses the dynamical behaviors of various multiweighted complex dynamical networks, with detailed...
  109. G

    Придбаний Книга A Reference Manual for Data Privacy Laws and Cyber Frameworks (Равіндра Дас)

    As the world is becoming more digital and entwined together, the cybersecurity threat landscape has no doubt become a daunting one. For example, typical threat variants of the past, especially those of phishing, have now become much more sophisticated and covert in nature. A lot of this has been...
  110. G

    Придбаний Книга The History of Computing: A Very Short Introduction (Дорон Свейд)

    Very Short Introductions: Brilliant, Sharp, Inspiring This lively Very Short Introduction reviews the central events, machines, and people that feature in established accounts of the history of computing, critically examining received perceptions and providing a fresh look at the nature and...
  111. G

    Придбаний Книга Multi-Agent Oriented Programming (Олів'є Буассьєр)

    Формат: Скан PDf https://www.yakaboo.ua/ua/multi-agent-oriented-programming.html
  112. G

    Придбаний Книга Windows 11 For Dummies, 2nd Edition (Алан Сімпсон)

    Take control of your Windows 11 experience, the easy way With millions of copies sold over 18 editions, Windows For Dummies is the all-time best selling tech reference—and there’s a reason. Windows 11 For Dummies, 2nd Edition brings you up to speed on the latest version of Windows, so you can...
  113. G

    Придбаний Книга Generative AI: Phishing and Cybersecurity Metrics (Равіндра Дас)

    The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For...
  114. G

    Придбаний Книга Generative AI and Digital Forensics (Равіндра Дас)

    In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at...
  115. G

    Придбаний Книга Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Systems Using Kubernetes (Брендан Бьорнс)

    Every distributed system strives for reliability, performance, and quality, but building such a system is hard. Establishing a set of design patterns enables software developers and system architects to use a common language to describe their systems and learn from the patterns and practices...
  116. G

    Придбаний Книга Microsoft 365 Certified: Collaboration Communications Systems Engineer Associate Certification Companion: A Guide to Prepare for Exam MS-721 (Фа

    This book is designed to help you prepare for Exam MS-721, which is required for Microsoft 365 Certified: Collaboration Communications Systems Engineer Associate certification. The book starts with an introduction to Exam MS -721 and Microsoft Teams. It discusses how to plan and design...
  117. G

    Придбаний Книга CCNA Certification Study Guide Volume 2: Exam 200-301 v1.1 (Дональд Робб)

    Your updated guide to success on the CCNA Certification exam In the newly revised second edition of the CCNA Certification Study Guide – Volume 2: Exam 200-301 v1.1, renowned Cisco educator and network engineer Todd Lammle and Donald Robb deliver a practical and effective test prep and roadmap...
  118. G

    Придбаний Книга Countering the Cloud: Thinking With and Against Data Infrastructures (Люк Манн)

    How do cables and data centers think? This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the pervasive logics of speed, efficiency, and resilience with more communal and ecological ways of thinking and being, turning technical “solutions”...
  119. G

    Придбаний Книга Generative AI and Cyberbullying (Равіндра Дас)

    Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly. For example, not only is the near-99% remote workforce now a reality, but businesses today are taking incident response and disaster recovery much more seriously these days as well. But another area that...
  120. G

    Придбаний Книга Version Control with Git: Powerful Tools and Techniques for Collaborative Software Development (Прем Понуторай)

    Track, branch, merge, and manage code revisions with Git, the free and open source distributed version control system. Through a series of step-by-step tutorials, this practical guide quickly takes you from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for...
  121. G

    Придбаний Книга Developing on AWS With C#: A Comprehensive Guide on Using C# to Build Solutions on the AWS Platform (Джеймс Чарльзворт)

    Many organizations today have begun to modernize their Windows workloads to take full advantage of cloud economics. If you're a C# developer at one of these companies, you need options for rehosting, replatforming, and refactoring your existing .NET Framework applications. This practical book...
  122. G

    Придбаний Книга Arduino Interrupts: Harness the Power of Interrupts in Your Arduino and ATmega328 Code (Норман Данбар)

    Improve your projects by leveraging the power of interrupts. This comprehensive guide makes it easy to understand and use interrupts with the ATmega328P microcontroller found on Arduino boards. With over 20 interrupts available, this book covers almost all of them and provides background...
  123. G

    Придбаний Книга Microsoft 365 Administration Inside Out (Аарон Гільметт)

    Conquer Microsoft 365 administration, from the inside out! Dive into Microsoft 365 administration and harness the full power of cloud scaling, automation, and availability in Microsoft 365! This supremely well-organized reference packs hundreds of time-saving solutions, tips, and workarounds...
  124. G

    Придбаний Книга Gitops Cookbook: Kubernetes Automation in Practice (Алекс Буено)

    Why are so many companies adopting GitOps for their DevOps and cloud native strategy? This reliable framework is quickly becoming the standard method for deploying apps to Kubernetes. With this practical, developer-oriented book, DevOps engineers, developers, IT architects, and SREs will learn...
  125. G

    Придбаний Книга Insider's Guide to Cloud Computing, An (Девід Лінтикум)

    Many cloud computing initiatives flat-out fail; others limp along, functioning tolerably without ever delivering what they promised. An Insider's Guide to Cloud Computing reveals why and shows how to do better. Cloud pioneer and long-time CTO David Linthicum explodes the industry's secrets and...
  126. G

    Придбаний Книга NGINX Cookbook: Advanced Recipes for High-Performance Load Balancing (Дерек ДеЙонге)

    NGINX is one of the most widely used web servers available today, in part because of its capabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This cookbook provides easy-to-follow examples to real-world problems in application delivery. The practical...
  127. G

    Придбаний Книга Digital Platforms and Transformation of Healthcare Organizations: Integrating Digital Platforms with Advanced IT Systems and Work Transformation

    COVID-19 accelerated healthcare’s transition towards digital technology since it helped expand the capacity of healthcare organizations (HCOs) through extended patient access and isolation. In addition to HCOs, this transition was adopted by other participants in the healthcare ecosystem, such...
  128. G

    Придбаний Книга Handbook of SDP for Multimedia Session Negotiations: SIP and WebRTC IP Telephony (Радхіка Ранджан Рой)

    This book on SDP is the first of this kind that attempts to put all SDP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single “super-SDP RFC” with almost one-to-one integrity from beginning to end to see the big picture of...
  129. G

    Придбаний Книга A Course in Networks and Markets: Game-theoretic Models and Reasoning (Рафаель Пас)

    Формат: Скан PDf https://www.yakaboo.ua/ua/a-course-in-networks-and-markets-game-theoretic-models-and-reasoning.html
  130. G

    Придбаний Книга Real-time Communication Protocols for Multi-hop Ad-hoc Networks: Wireless Networking in Production and Control Systems (Райнхард Готшайн)

    This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) and their integration into a flexible, versatile, fully operational, self-contained communication system. The use of wireless real-time communication technologies for...
  131. G

    Придбаний Книга Serverless Architectures on AWS (Пітер Сбарскі)

    Serverless Architectures on AWS, Second Edition teaches you how to design, secure, and manage serverless backend APIs for web and mobile applications on the AWS platform. You'll get going quickly with this book's relevant real-world examples, code listings, diagrams, and clearly-described...
  132. G

    Придбаний Книга Modern App Development with Dart and Flutter 2: A Comprehensive Introduction to Flutter (Дітер Майллер)

    The book introduces the programming language Dart, the language used for Flutter programming. It then explains the basics of app programming with Flutter in version 2. Using practical examples such as a games app, a chat app and a drawing app, important aspects such as the handling of media...
  133. G

    Придбаний Книга Visualizing Google Cloud: 101 Illustrated References for Cloud Engineers and Architects (Пріянка Вергадія)

    Easy-to-follow visual walkthrough of every important part of the Google Cloud Platform The Google Cloud Platform incorporates dozens of specialized services that enable organizations to offload technological needs onto the cloud. From routine IT operations like storage to sophisticated new...
  134. G

    Придбаний Книга Privacy-Preserving Machine Learning (Ді Чжуан)

    Privacy-Preserving Machine Learning is a practical guide to keeping ML data anonymous and secure. You'll learn the core principles behind different privacy preservation technologies, and how to put theory into practice for your own machine learning. Complex privacy-enhancing technologies are...
  135. G

    Придбаний Книга Microsoft Azure Data Solutions - An Introduction (Деніел А. Сіра)

    Discover and apply the Azure platform's most powerful data solutions Cloud technologies are advancing at an accelerating pace, supplanting traditional relational and data warehouse storage solutions with novel, high-value alternatives. Now, three pioneering Azure Data consultants offer an...
  136. G

    Придбаний Книга Professional Scrum Development with Azure DevOps (Річард Хундхаузен)

    Master proven processes for improving development with Scrum and Azure DevOps This guide can help any development team plan, track, and manage work far more effectively, by combining today's leading agile framework (Scrum) and Microsoft's ALM/DevOps toolset (Azure DevOps). Renowned Scrum expert...
  137. G

    Придбаний Книга Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations (Морей Дж. Хабер)

    See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors...
  138. G

    Придбаний Книга If It's Smart, It's Vulnerable (Мікко Хюппонен)

    Reimagine the future of the internet All our devices and gadgets—from our refrigerators to our home security systems, vacuum cleaners, and stereos—are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping...
  139. G

    Придбаний Книга Information Security Management (Майкл Воркман)

    Information Security Management, Second Edition arms students with answers to the most critical questions about the fields of cybersecurity. It provides students with references to more in-depth study in areas where they may need to specialize. The Second Edition covers operations—the job of...
  140. G

    Придбаний Книга Cloud Native Infrastructure with Azure: Building and Managing Cloud Native Applications (Майкл Кіхо)

    The cloud is becoming the de facto home for companies ranging from enterprises to startups. Moving to the cloud means moving your applications from monolith to microservices. But once you do, running and maintaining these services brings its own level of complexity. The answer? Modularity...
  141. G

    Придбаний Книга Serverless Architectures on AWS (Пітер Сбарскі)

    DESCRIPTION Serverless architecture is about having more time to focus on code, and moving quickly. In these new architectures, traditional back-end servers are replaced with cloud functions acting as discrete singlepurpose services. With serverless compute technologies like AWS Lambda...
  142. G

    Придбаний Книга Art of Network Architecture, The: Business-Driven Design (Деніз Донохью)

    The Art of Network Architecture Business-Driven Design The business-centered, business-driven guide to architecting and evolving networks The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving...
  143. G

    Придбаний Книга Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform (Розмарі Ванг)

    Essential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to...
  144. G

    Придбаний Книга Fundamentals of IoT Communication Technologies (Роландо Ерреро)

    This textbook explores all of the protocols and technologies essential to IoT communication mechanisms. Geared towards an upper-undergraduate or graduate level class, the book is presented from a perspective of the standard layered architecture with special focus on protocol interaction and...
  145. G

    Придбаний Книга Practical Internet of Things Networking: Understanding IoT Layered Architecture (Роландо Ерреро)

    This textbook explores the different protocols and technologies that are key to supporting the most important Internet of Things (IoT) networking scenarios. Intended for upper undergraduate classes, the author presents these protocols and technologies from a perspective of the standard layered...
  146. G

    Придбаний Книга Internet Routing Architectures (Сем Халабі)

    The industry's leading resource for Internet routing solutions and scenarios *Explore the functions, attributes, and applications of BGP-4, the de facto interdomain routing protocol, through practical scenarios and configuration examples *Learn the contemporary Internet structure and understand...
  147. G

    Придбаний Книга Data Governance Success: Growing and Sustaining Data Governance (Рупа Маханті)

    While good data is an enterprise asset, bad data is an enterprise liability. Data governance enables you to effectively and proactively manage data assets throughout the enterprise by providing guidance in the form of policies, standards, processes and rules and defining roles and...
  148. G

    Придбаний Книга Hacking Multifactor Authentication (Роджер А. Граймс)

    Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use...
  149. G

    Придбаний Книга Ransomware Protection Playbook (Роджер А. Граймс)

    Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran...
  150. G

    Придбаний Книга Hyperconverged Infrastructure Data Centers: Demystifying HCI (Сем Халабі)

    This book approaches the HCI topic from the point of view that any individual working this field needs to have enough knowledge in all the different areas such as storage, storage networking, compute, virtualization, switching and routing and automation. The book will explain each area in the...
  151. G

    Придбаний Книга Secure Communications: Applications and Management (Роджер Дж. Саттон)

    If you need to know more about communication's security management, this is the perfect book for you... Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by...
  152. G

    Придбаний Книга Practical Data Communications (Роджер Л. Фріман)

    Data communication is the movement of encoded data by electronic means. It is the fastest growing segment of the telecommunications industry and is involved in almost every facet of life today. Written by bestselling telecommunications expert Roger Freeman, this updated edition provides a...
  153. G

    Придбаний Книга Microservice Architecture (Іраклій Надарейшвілі)

    Microservices can have a positive impact on your enterprise-just ask Amazon and Netflix-but you can fall into many traps if you don't approach them in the right way. This practical guide covers the entire microservices landscape, including the principles, technologies, and methodologies of this...
  154. G

    Придбаний Книга Terraform in Action (Скотт Вінклер)

    Terraform is a provisioning tool for building, changing, and combining cloud infrastructure safely and efficiently. By defining infrastructure as code, Terraform empowers its users to deploy their entire stack to the cloud at the touch of a button. • Cloud architecture with Terraform •...
  155. G

    Придбаний Книга OSPF and IS-IS: From Link State Routing Principles to Technologies (Руї Валадас)

    This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies...
  156. G

    Придбаний Книга Project Management Methodologies, Governance and Success: Insight from Traditional and Transformative Research (Роберт Джослін)

    With all signs pointing to an increased use of and interest in project-based work in modern organizations, the better scholars are able to make sense of the current state of the field through theory development and empirical investigation, the more successful projects promise to become. This...
  157. G

    Придбаний Книга Computerlexikon für Senioren für Dummies (Ден Гукін)

    Haben Sie Schwierigkeiten, die vielen verschiedenen Begriffe rund um den Computer zu verstehen? In diesem Buch erklären Dan und Sandra Gookin leicht verständlich und auf den Punkt gebracht Begriffe aus der IT-Sprache, von A wie abbrechen bis Z wie Zwischenablage. Das Buch enthält alle neuen...
  158. G

    Придбаний Книга The Cloud Data Lake: A Guide to Building Robust Cloud Data Architecture (Рукмані Гопалан)

    More organizations than ever understand the importance of data lake architectures for deriving value from their data. Building a robust, scalable, and performant data lake remains a complex proposition, however, with a buffet of tools and options that need to work together to provide a seamless...
  159. G

    Придбаний Книга System Center Configuration Manager Current Branch Unleashed (Джеррі Гемпсон)

    System Center Configuration Manager Current Branch provides a total systems management solution for a people-centric world. It can deploy applications to individuals using virtually any device or platform, centralizing and automating management across on-premise, service provider, and Microsoft...
  160. G

    Придбаний Книга Salesforce Field Service: A Beginner’s Guide to Creating, Managing, and Automating Field Service (Саїтеджа Чатраті)

    Salesforce Field Service (formerly Field Service Lightning) connects customers, workforce, and products on a single platform to deliver exceptional on-site services. This book guides Field Service enthusiasts in creating, managing, and automating support with use cases and real-time examples...
  161. G

    Придбаний Книга Operating OpenShift: An SRE Approach to Managing Infrastructure (Мануель Девальд)

    Kubernetes has gained significant popularity over the past few years, with OpenShift as one of its most mature and prominent distributions. But while OpenShift provides several layers of abstraction over vanilla Kubernetes, this software can quickly become overwhelming because of its rich...
  162. G

    Придбаний Книга Kubernetes Patterns: Reusable Elements for Designing Cloud Native Applications (Білгін Ібірам)

    The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures offer new distributed primitives that require a different set of practices than many developers, tech leads, and architects are accustomed...
  163. G

    Придбаний Книга Kubernetes Cookbook: Building Cloud Native Applications (Джонатан Мішо)

    Kubernetes is the de facto standard for container orchestration and distributed applications management across a microservices framework. With this practical cookbook, you'll learn hands-on Kubernetes recipes for automating the deployment, scaling, and operations of application containers across...
  164. G

    Придбаний Книга Docker - Up & Running: Shipping Reliable Containers in Production (Карл Маттіас)

    Docker and Linux containers have fundamentally changed the way that organizations develop, deliver, and run software at scale. But understanding why these tools are important and how they can be successfully integrated into your organization's ecosystem can be challenging. This fully updated...
  165. G

    Придбаний Книга Asterisk: The Definitive Guide: Open Source Telephony for the Enterprise (Джим Ван Маггелен)

    Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy with a detailed roadmap that shows you how to install and configure this open source software, whether you’re upgrading...
  166. G

    Придбаний Книга Google Cloud Cookbook: Practical Solutions for Building and Deploying Cloud Services (Дрю Годун)

    Get quick hands-on experience with Google Cloud. This cookbook provides a variety of self-contained recipes that show you how to use Google Cloud services for your enterprise application. Whether you're looking for practical ways to apply microservices, AI, analytics, security, or networking...
  167. G

    Придбаний Книга Visual Studio Extensibility Development: Extending Visual Studio IDE for Productivity, Quality, Tooling, and Analysis (Рішабх Верма)

    Learn the extensibility model of Visual Studio to enhance the Visual Studio integrated development environment (IDE). This book will cover every aspect, starting from developing an extension to publishing it and making it available to the end user. The book begins with an introduction to the...
  168. G

    Придбаний Книга Data Governance and Data Management: Contextualizing Data Governance Drivers, Technologies, and Tools (Рупа Маханті)

    This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and...
  169. G

    Придбаний Книга The Cloud Leader’s Handbook: Strategically Innovate, Transform, and Scale Organizations (Рон К. Л'Естев)

    This book is a comprehensive guide covering modern cloud strategies and leadership approaches for building and scaling organizations to maturity on their cloud adoption journey. The book starts by examining technical topics from the perspective of the cloud leader, who is responsible for cloud...
  170. G

    Придбаний Книга Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications (Санджиб Сінха)

    Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will...
  171. G

    Придбаний Книга Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition (Аарон ЛеМастерс)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and...
  172. G

    Придбаний Книга Securing SCADA Systems (Рональд Л. Круц)

    Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems...
  173. G

    Придбаний Книга Professional Windows Desktop and Server Hardening (Роджер А. Граймс)

    Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating...
  174. G

    Придбаний Книга Sarbanes-Oxley Guide for Finance and Information Technology Professionals (Санджай Ананд)

    Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals "Effective SOX programs enlist the entire organization to build and monitor a compliant control environment. However, even the best SOX programs are inefficient at best, ineffective at worst, if there is a lack...
  175. G

    Придбаний Книга Free Space Laser Communication with Ambient Light Compensation (Салех Фарук)

    This book addresses 5G network capacity requirements with a new architecture for 5G Optical Backhaul Network. The author first describes the challenges for 5G backhaul network requirements and then the details of an Optical Backhaul Network for 5G. The author describes an architecture, in which...
  176. G

    Придбаний Книга Data Governance and Compliance: Evolving to Our Current High Stakes Environment (Рупа Маханті)

    This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines. Given the continuously evolving and complex regulatory landscape and the growing number...
  177. G

    Придбаний Книга Governing New Frontiers in the Information Age: Toward Cyber Peace (Скотт Дж. Шакелфорд)

    The frontiers are the future of humanity. Peacefully and sustainably managing them is critical to both security and prosperity in the twenty-first century. Many pressing environmental and security threats now facing the international community may be traced to the frontiers. From climate change...
  178. G

    Придбаний Книга Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing (Роджер А. Граймс)

    Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most...
  179. G

    Придбаний Книга The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting (Марк Моровчинські)

    Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to...
  180. G

    Придбаний Книга Computers and Society: Modern Perspectives (Рональд М. Беккер)

    The last century has seen enormous leaps in the development of digital technologies, and most aspects of modern life have changed significantly with their widespread availability and use. Technology at various scales - supercomputers, corporate networks, desktop and laptop computers, the...
  181. G

    Придбаний Книга Radical Reporting: Writing Better Audit, Risk, Compliance, and Information Security Reports (Сара І. Джеймс)

    "If I were giving out an award for 'book of the year' for internal audit professionals, I would certainly award it to her outstanding manuscript: Radical Reporting: Writing Better Audit, Risk, Compliance and Information Security Reports." - Richard Chambers, Former President and CEO, The...
  182. G

    Придбаний Книга Numbers and Computers (Рональд Т. Кнейзель)

    This textbook details the variety of number formats used by computers, thereby helping to ground readers in what can and cannot be represented accurately, especially by floating-point numbers. The book's first part details standard representations of integers and floating-point numbers. The...
  183. G

    Придбаний Книга Beyond Resilience: Patterns of Success in Fintech and Digital Transformation (Леда Глиптіс)

    Is success pattern-based? Is the journey of successfully building new banks or services (either from scratch or in the context of a going concern) predictable enough to be repeatable? And if there are patterns, are they within our gift to replicate? Beyond Resilience: Patterns of Success in...
  184. G

    Придбаний Книга CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) Commands in O

    All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource Use this fully updated quick reference resource to help memorize commands and concepts as you earn your CCNP or CCIE certification. Filled with valuable, easy-to-access information, it's portable enough to use...
  185. G

    Придбаний Книга Parallel Scientific Computation: A Structured Approach Using BSP (Роб Х. Бісселінг)

    Building upon the wide-ranging success of the first edition, Parallel Scientific Computation presents a single unified approach to using a range of parallel computers, from a small desktop computer to a massively parallel computer. The author explains how to use the bulk synchronous parallel...
  186. G

    Придбаний Книга Unifying Business, Data, and Code: Designing Data Products with JSON Schema (Хуан Віотті)

    In the modern symphony of business, each section-from the technical to the managerial-must play in harmony. Authors Ron Itelman and Juan Cruz Viotti introduce a bold methodology to synchronize your business and technical teams, transforming them into a single, high-performing unit. Misalignment...
  187. G

    Придбаний Книга Artificial Intelligence-Based 6G Networking (Радхіка Ранджан Рой)

    Artificial Intelligence-Based 6G Networking focuses exclusively on the upcoming sixth-generation (6G) network and services slated for implementation by 2030. It explores the paradigm shift that is 6G. It discusses the deep integration of computing and communication, supported by artificial...
  188. G

    Придбаний Книга Роберт С. Мартін (комплект із 3 книг) (Роберт Сесіл Мартін)

    Книга 1. Чистий код. Створення і рефакторинг за допомогою Agile Навіть поганий програмний код може працювати. Однак якщо код не є «чистим», це завжди буде заважати розвитку проекту і компанії-розробника, віднімаючи значні ресурси на його підтримку і «приборкання». Ця книга присвячена хорошому...
  189. G

    Придбаний Книга Чиста архітектура (Роберт Сесіл Мартін)

    Користуючись універсальними правилами архітектури програмного забезпечення, можна значно підвищити продуктивність праці розробників протягом усього життєвого циклу будь-якої програмної системи. Легендарний майстер програмного забезпечення Роберт К. Мартін («Дядечко Боб») розкриває ці правила у...
Угорі