Listing 1 - 10 of 1368 | << page >> |
Sort by
|
Choose an application
Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide.
Choose an application
Choose an application
Travailler mieux et sans stress. La boîte mail pourrait être à elle seule une illustration de la cacophonie du monde du travail d'aujourd'hui ! Des actions multiples et diverses à réaliser, des volumes d'informations en constante augmentation, des interruptions permanentes, des temps perdus à retrouver dossiers ou documents importants dans les arcanes de cet outil incontournable. L'objet de ce livre concret et pratique est de vous réconcilier avec cette « e-boîte aux lettres ». Accompagné des traits d'humour de Luc Tesson, Laurent Gessay vous propose un monde où votre boîte mail reprend sa juste place. Il vous dévoile des solutions simples que vous pourrez mettre en oeuvre de manière personnalisée. Grâce à cette méthode appliquée au quotidien, vous libérez votre mental, améliorez votre concentration et donnez plus de sens à vos actions. Vous avez désormais, entre vos mains, la possibilité de faire cohabiter sérénité et efficacité dans votre vie professionnelle.
Choose an application
Key FeaturesCompletely revised and updated for Ansible 4.0 and beyondTackle complex automation challenges with the newly added features in AnsibleLearn about the rapidly expanding field of network automation using Ansible, with the help of practical examples for configuring network devicesBook DescriptionAnsible is a modern, YAML-based automation tool (built on top of Python, one of the world’s most popular programming languages) with a massive and ever-growing user base. Its popularity and Python underpinnings make it essential learning for all in the DevOps space. This fourth edition of Mastering Ansible provides complete coverage of Ansible automation, from the design and architecture of the tool and basic automation with playbooks to writing and debugging your own Python-based extensions. You'll learn how to build automation workflows with Ansible’s extensive built-in library of collections, modules, and plugins. You'll then look at extending the modules and plugins with Python-based code and even build your own collections — ultimately learning how to give back to the Ansible community. By the end of this Ansible book, you'll be confident in all aspects of Ansible automation, from the fundamentals of playbook design to getting under the hood and extending and adapting Ansible to solve new automation challenges.What you will learnGain an in-depth understanding of how Ansible works under the hoodGet to grips with Ansible collections and how they are changing and shaping the future of AnsibleFully automate the Ansible playbook executions with encrypted dataUse blocks to construct failure recovery or cleanupExplore the playbook debugger and Ansible consoleTroubleshoot unexpected behavior effectivelyWork with cloud infrastructure providers and container systemsWho this book is forIf you are an Ansible developer or operator who has a detailed understanding of its core elements and applications but are now looking to enhance your skills in applying automation using Ansible, this book is for you. Prior experience working with core system administration tasks on Linux and basic familiarity with concepts such as cloud computing, containers, network devices, and fundamentals of a high-level programming language will help you make the most of this book.
Choose an application
Align your SOC with the ATT&CK framework and follow practical examples for successful implementation Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand Cloud, Windows, and Network ATT&CK Framework using different techniquesAssess the attack potential and implement frameworks aligned with Mitre ATT&CKAddress security gaps to detect and respond to all security threatsBook DescriptionThe Mitre ATT&CK framework is an extraordinary resource for all SOC environments, however, determining the appropriate implementation techniques for different use cases can be a daunting task. This book will help you gain an understanding of the current state of your SOC, identify areas for improvement, and then fill the security gaps with appropriate parts of the ATT&CK framework. You’ll learn new techniques to tackle modern security threats and gain tools and knowledge to advance in your career. In this book, you’ll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you’ll explore how to implement the framework and use it to fill any security gaps you’ve identified, expediting the process without the need for any external or extra resources. Finally, you’ll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve. By the end of this book, you’ll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.What you will learnGet a deeper understanding of the Mitre ATT&CK FrameworkAvoid common implementation mistakes and provide maximum valueCreate efficient detections to align with the frameworkImplement continuous improvements on detections and review ATT&CK mappingDiscover how to optimize SOC environments with automationReview different threat models and their use casesWho this book is forThis book is for SOC managers, security analysts, CISOs, security engineers, or security consultants looking to improve their organization's security posture. Basic knowledge of Mitre ATT&CK, as well as a deep understanding of triage and detections is a must.
Choose an application
Quatrième de couverture : "Un livre tout en couleur pour bien débuter sur Facebook et éviter les pièges. Chaque jour, des milliers de nouveaux utilisateurs viennent grandir les rangs des millions d'internautes inscrits sur Facebook. Ce livre ultra complet et très pédagogique, va vous aider à créer et gérer un compte Facebook au quotidien en toute sécurité."
Choose an application
"Avec de plus en plus d'utilisateurs qui rejoignent Instagram chaque jour, l'application de ce réseau social se développe à une vitesse exponentielle. Cependant, peu d'entre nous savent comment utiliser efficacement Instagram. Après avoir lu ce livre, vous disposerez des outils et des stratégies nécessaires à la création d'un profil Instagram efficace."
Choose an application
Choose an application
Note de l'éditeur : "Guide pratique pour utiliser les différentes fonctionnalités de Facebook : la messagerie, le journal, les listes d'amis, les groupes, les pages, gérer son compte, publier des photos et vidéos, informer d'un événement, faire une publicité sociale, etc. Facebook est aujourd'hui rentré dans la vie quotidienne de quasiment tout le monde. Le nombre de mails envoyés via Facebook dépasse même celui envoyé via les webmails aux Etats-Unis. La plupart des internautes n'utilise qu'une infime partie des possibilités du site, alors que c'est un outil très riche qui permet par exemple de gagner de l'argent ou de vraiment personnaliser son profil à son image. Ce guide va plus loin que tous les autres car il donne les vrais secrets de Facebook au grand public. Utilisation du journal de son profil, gestion des listes d'amis, publication des photos et vidéos, utilisation des groupes... tout cela n'aura bientôt plus de secret pour tous les utilisateurs de Facebook".
Choose an application
Gain proficiency in monitoring infrastructure along with focusing on cloud backup and recoveryKey FeaturesExplore the 3-2-1 rule of backups in Veeam to keep your data safeGain in-depth knowledge of NAS backups and Scale-Out Repositories to use in your virtual environmentDiscover Veeam’s monitoring and reporting utility - Veeam ONE - along with Linux and Window’s proxyBook DescriptionVeeam is one of the leading modern data protection solutions, and mastering this technology can help you to protect your virtual environments effectively. This book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam. You will even gain in-depth knowledge of advanced concepts such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE. This book starts by taking you through Veeam essentials, including installation, best practices, and optimizations for Veeam Backup & Replication. You'll get to grips with the 3-2-1 rule to safeguard data along with understanding how to set up a backup server, proxies, repositories, and more. Later chapters go on to cover a powerful feature of Veeam 10 – NAS backup. As you progress, you'll learn about scale-out Repositories and best practices for creating them. In the concluding chapters, you'll explore the new proxy option available in both Linux and Windows. Finally, you'll discover advanced topics such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE. By the end of this book, you will be equipped with the skills you need to implement Veeam Backup & Replication for your environment and disaster recovery.What you will learnDiscover the advanced concepts of Veeam Backup & Replication 10Master application optimizations based on Veeam best practicesUnderstand how to configure NAS backups and work with repositories and proxiesExplore different ways to protect your backups, including object immutability and cloud backup and recoveryDiscover how DataLabs worksUnderstand how Instant VM Recovery allows you to restore virtual machinesBecome well versed in Veeam ONE for monitoring and reporting on your environmentWho this book is forThis Veeam backup book is for IT professionals who have intermediate to advanced-level knowledge of virtualization as well as backups and backup applications. Anyone who needs a reference guide for learning the advanced features of Veeam Backup & Replication and how they are used, including best practices and optimizations, will also find this book useful.
Listing 1 - 10 of 1368 | << page >> |
Sort by
|