Bezpieczeństwo systemów

Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication

Lisa Bock

IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa

Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes

Matthew Nohr, Isaac Rabinovitch

Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure

Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, ...

Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture

Mitesh Soni

Implementing DevSecOps Practices. Understand application security testing and secure coding by integrating SAST and DAST

Vandana Verma Sehgal

Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection

Tom Piens Aka 'Reaper', Rutger Truyers

Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights

James D. Miller, Paul R. Johnson, Josh Diakun, Derek Mock