Filter
Nätverk & kommunikation
Filter
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of …
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and …
Microsoft Teams is used in hundreds of thousands of organizations to help keep remote and hybrid workplaces with dispersed workforces running smoothly. But while Microsoft Teams …
Companies are spending billions on machine learning projects, but its money wasted if the models cant be deployed effectively. In this practical guide, Hannes Hapke and Catherine …
Automate the fundamental structure of your cloud account with reliable coded security and governance in an Amazon Web Services (AWS) environment. This practical guide shows …
Samba is a cross-platform triumph: it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients.This book describes all the options for …
Over the years, thousands of tools have been developed for debugging TCP/IP networks. They range from very specialized tools that do one particular task, to generalized suites that …
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Junipers SRX Series networking device. …
What once seemed nearly impossible has turned into reality. The number of available Internet addresses is now nearly exhausted, due mostly to the explosion of commercial websites …
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement …