• Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: B06Y18XC5Y
    • ASIN: B06Y18XC5Y
    • Manufacturer: O'Reilly Media

  • Microarray Image and Data Analysis: Theory and Practice (Digital Imaging and Computer Vision)

    Microarray Image and Data Analysis: Theory and Practice is a compilation of the latest and greatest microarray image and data analysis methods from the multidisciplinary international research community. Delivering a detailed discussion of the biological aspects and applications of microarrays, the book: Describes the key stages of image processing, gridding, segmentation, compression, quantification, and normalization Features cutting-edge approaches to clustering, biclustering, and the reconstruction of regulatory networks Covers different types of microarrays such as DNA, protein, tissue,... [Read More]

    • ASIN: 1466586826
    • ASIN: 1466586826
    • ISBN: 9781466586826
    • Brand: CRC Press
    • Manufacturer: CRC Press

  • Unleash Possible: A Marketing Playbook That Drives B2B Sales

    Unleash Possible is a how-to guide for high-growth marketing in complex selling environments. Author Samantha Stone, the revenue catalyst, doesn't just tell you what to do, she shows you how to do it, and how to partner with sales to get the right results. There is no shortage of inspiring advice calling you to transform your marketing efforts. They all preach, correctly, that B2B marketing has changed and buyers are in control. The problem is--most advice tells you to transform, but does little to address the practical realities of making changes in organizations that have complex relationshi... [Read More]

    • ASIN: 1937985881
    • ASIN: 1937985881
    • ISBN: 1937985881
    • Manufacturer: Marketing Advisory Network, LLC

  • Network segmentation Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics

    The Toolkit contains the following practical and powerful enablers with new and updated Network segmentation specific requirements:Step 1 get your bearings resources: The quick edition of the Network segmentation Self Assessment book in PDF containing 49 requirements to perform a quickscan, get an overview and share with stakeholders, plus an example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation. Step 2 set concrete goals resources: Featuring 700 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment wi... [Read More]

    • ASIN: B07BFX876G
    • UPC: 012868298376
    • ASIN: B07BFX876G
    • Brand: The Art of Service
    • Manufacturer: The Art of Service

  • Handbook for Strategic HR : Best Practices in Organization Development from the OD Network

    The role of human resources is no longer limited to hiring, managing compensation, and ensuring compliance. Learn the skills HR professionals need to become key partners in leading their

    • UPC: 20973946

  • Effective Cybersecurity : A Guide to Using Best Practices and Standards

    The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use

    • UPC: 56133768

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips - eBook

    There has never been a CCNA Guide like this. Whether you're a beginner or experienced, you need to know the basics of CCNA. This book can teach you everything fundamental you need to know. It

    • UPC: 812622361

  • CCIE Top Success Secrets and Best Practices: CCIE Experts Share The World's Cisco Certified Internetwork Expert Greatest Tips - eBook

    There has never been a CCIE Guide like this. Whether you're a beginner or experienced, you need to know the basics of CCIE. This book can teach you everything fundamental you need to know. It

    • UPC: 637265210

  • KVM Best Practices - eBook

    Die im Linux-Kernel integrierte Hardwarevirtualisierung KVM gewinnt im Enterprise-Bereich zunehmend an Bedeutung. Nach einer kurzen Einführung in die Virtualisierung mit KVM werden Lösungen alltäglicher Aufgabenstellungen aus den Bereichen Netzwerk, Storage und Deployment primär mit Hilfe

    • UPC: 702776342

  • Supply Network Management : Mit Best Practice Der Konkurrenz Voraus

    Supply Network Management: Mit Best Practice der Konkurrenz voraus (German

    • UPC: 29642398

  • Junos High Availability : Best Practices for High Network Uptime

    Whether a business's network is a complex carrier network or just a few machines supporting a small enterprise, "JUNOS High Availability" can help developers to build reliable and resilient networks that won't fall prey to

    • UPC: 10986817

  • Cisco CallManager Best Practices - eBook

    Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility,

    • UPC: 869062570

  • Cisco Firepower Threat Defense (Ftd) : Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (Ngfw), Next-Generation Intrusion Prevention System (Ngips), and Advanced Malware Protection (Amp)

    9781587144806

    • UPC: 56042616

  • Lesson 3: Common Mistakes and Best Practices for Designing Network Security Zones

    Network Segmentation - CompTIA Security+ SY0-501 - 3.2

    Network Segmentation Benefits: Are You Threat Ready? | Burwood Group