Analyzing how hacks are done, so as to stop them in the future. Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design d...
This book integrates the foundations of quantum computing with a hands-on coding approach to this emerging field; it is the first to bring these elements together in an updated manner. This work is suitable...
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other conservative organizations plan moves to the cloud, development teams for companies worldwide are attempting to build l...
In the past few years, going cloud native has been a big advantage for many companies. But it’s a tough technique to get right, especially for enterprises with critical legacy systems. This practical h...
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
This document specifies the requirements for establishing, imple...
This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technologic...
We use software every day to perform all kinds of magical, powerful tasks. It's the force behind stunning CGI graphics, safe online shopping, and speedy Google searches. Software drives the modern world,...
DATA CENTER HANDBOOK
Written by 59 experts and reviewed by a seasoned technical advisory board, the Data Center Handbook is a thoroughly revised, one-stop resource that clearly explains the fundamenta...
Enter your address and we will specify the offer for your area.