Salesforce Essentials for Administrators, Shrivastava Mohith
Автор: Shrivastava Mohith Название: Learning Salesforce Lightning Application Development ISBN: 1787124673 ISBN-13(EAN): 9781787124677 Издательство: Неизвестно Цена: 7539.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Built on the Salesforce App Cloud, the new Salesforce Lightning Experience combines three major components: Lightning Design System, Lightning App Builder, and Lightning Components, to provide an enhanced user experience. This book will enable you to quickly create modern, enterprise apps with Lightning.
Автор: Shrivastava Mohith Название: Learning Salesforce Einstein ISBN: 1787126897 ISBN-13(EAN): 9781787126893 Издательство: Неизвестно Рейтинг: Цена: 11769.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Shrivastava, Avinash K Название: Emerging Trends in Decision Sciences and Business Operations ISBN: 1032269197 ISBN-13(EAN): 9781032269191 Издательство: Taylor&Francis Рейтинг: Цена: 23734.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Shrivastava Neeraj, Mahajan Shubhangi, Varma Ajit Название: Symbiotic Soil Microorganisms: Biology and Applications ISBN: 303051918X ISBN-13(EAN): 9783030519186 Издательство: Springer Рейтинг: Цена: 21953.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: 1. Title: Distribution and diversity of Rhizobia associated with legumes of the Indian subcontinentIndu Singh Sankhla and Alkesh TakMicrobiology and Molecular biology Laboratory, Department of Botany, University of Rajasthan, Jaipur, 302004Email: induiitkgp@gmail.com;alkesh.tak@gmail.com 2. Title: Current status- Enlightens in its biology and Omics approach on Arbuscular mycorrhizal communityTulasikora, V. and Manoj Kumar Acharya N. G. Ranga Agricultural University, Bapatla, Andhra PradeshBanaras Hindu University, Allahabad UP, IndiaEmail: valaparla_mvk@rediffmail.com; tulasikorra1990@gmail.com 3. Title: Rhizobial Symbiosis-Genome wide comparative analyses of nitrogen-fixing legume-rhizobial symbiotic bacteria: New insight into functional and ecological features1Swati Pattanaik, 2Balaram Mohapatra, 3Deepak Kumar Verma, 1Devi Prasad Samantaray*, 1Bibhuti Bhusan Mishra, 4Upendra Kumar*1Department of Microbiology, College of Basic Science and Humanities, Odisha University of Agriculture and Technology (OUAT), Bhubaneswar, 751003, India2Department of Bioscience and Bioengineering, Indian Institute of Technology Bombay, Bombay, 400076, India3Department of Agriculture and Food Engineering, Indian Institute of Technology Kharagpur, Kharagpur, 721302, India4India Crop Production Division, ICAR-National Rice Research Institute, Cuttack, 753006, India*Correspondence: Devi Prasad Samantaray (dpsamantaray@yahoo.com) 4. Title: Arbuscular Mycorrhizal fungi: Potential plant protective agent against herbivores insect and its importance in Sustainable AgricultureAnandakumar Selvaraj and Kalaiselvi Thangavel Department of Agricultural Microbiology, Tamil Nadu Agricultural University, Coimbatore - 641003Email: 5. Title: Bioactive compounds from leaf endophytesParikshana Mathur, Payal Mehtani, Charu Sharma, Pradeep Bhatnagar Department of Biotechnology, IIS Gurukul Marg, SFS, Mansarovar, Jaipur-302020Email: payal.mehtani@iisuniv.ac.in 6. Title: Leave EndophytesHira Mehboob Mirza 174 Pennsylvania Avenue, Apt 1, Westminster, 21157, Maryland, USAEmail: hiraqau@yahoo.com 7. Title: Unravelling the role of endophytes in micronutrient uptake and enhanced crop productivityKanchan Vishwakarma1, Ajit Varma1, Nitin Kumar2 1Amity Institute of Microbial Technology, Amity University Uttar Pradesh, Sector 125, Noida - 201313, IndiaE.mail: kvishwakarma@amity.edu 2Department of Biotechnology, Periyar Maniammai Institute of Science and Technology, Thanjavur, Tamil Nadu, 613403, IndiaEmail: nitin@pmu.edu 8. Title: Interaction Between Root Endophytes and Plants: their bioactive products and significant functions.Nitika Kapoor and Dhriti Kapoor Hans Raj Mahila Maha Vidyalaya, Jalandhar, Punjab, India Lovely Professional University, Jalandhar, Punjab, India Email: nitikaarora8@gmail.com 9. Title: Halophyte-endophyte interactions: Linking microbiome community distribution and functionality to salinityBliss U. Furtado, K. Hrynkiewicz Department of MicrobiologyNicolaus Copernicus UniversityLwowska 1, 87-100 TorunE-mail: hrynk@umk.pl 10. Title: Role of root endophytes in disease manage
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently.
Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law.
Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations.
On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime.
Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
Описание: This book is designed to show you how to create robust, scalable, highly available and fault-tolerant solutions by learning different aspects of solution architecture and next-generation architecture design in the cloud environment.
Автор: Shrivastava Anurag, Deshpande Tanmay Название: Hadoop Blueprints ISBN: 1783980303 ISBN-13(EAN): 9781783980307 Издательство: Неизвестно Рейтинг: Цена: 9378.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Shrivastava Saurabh, Srivastav Neelanjali Название: Solutions Architect`s Handbook ISBN: 1838645640 ISBN-13(EAN): 9781838645649 Издательство: Неизвестно Рейтинг: Цена: 10666.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book will show you how to create robust, scalable, highly available and fault-tolerant solutions by learning different aspects of Solution architecture and next-generation architecture design in the Cloud environment.
This book is motivated by the simple hope that the cloud of the global financial crisis may yet have a silver lining—that political leaders, economists, and management scholars might seize this opportunity to reflect critically on the assumptions, practices, and infrastructures that have precipitated the crisis and to imagine and create new forms of organization that sustainably enhance the well-being of global stakeholders.
The contributors suggest that aesthetic management, high reliability and crisis management, and sustainability science have much to contribute to the resolution of the collapse that we've witnessed, and to providing enduring lessons for how to structure the institutions of the future. Learning From the Global Financial Crisis devotes a section to each of these areas, offering full-length chapters which explore key issues in depth, as well as shorter commentaries that focus on practical considerations. The chapters progress from micro-level issues that pertain to individuals and teams who act creatively; to the meso-level issues that pertain to the structures, practices, and processes; to the macro-level issues that pertain to the interdependent, ecological systems.
Together, the contributions emphasize the importance of developing holistic responses to the financial crisis. The result is a volume that casts new light on traditional economic and managerial theories and policies and provides fresh ideas to a new generation of scholars and practitioners.
Автор: Verma Rishabh, Shrivastava Neha Название: .Net Core 2.0 by Example ISBN: 1788395093 ISBN-13(EAN): 9781788395090 Издательство: Неизвестно Цена: 10666.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: With the rise in the number of tools and technologies available today, developers and architects are always exploring ways to create better and smarter solutions. Before, the differences between target platforms was a major roadblock, but that`s not the case now. .NET Core 2.0 By Example will take you on an exciting journey to building better ...
Автор: Shrivastava V. K. Название: Manthan: Multifaceted Reflections on the Indian Armed Forces ISBN: 9390439043 ISBN-13(EAN): 9789390439041 Издательство: Неизвестно Рейтинг: Цена: 9564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book establishes the relevance of war as an instrument of state policy, and the necessity of armed forces to protect and promote national interests. It then traces India's warring traditions and the enviable professionalism of the Indian armed forces. Reflecting on their post-independence military ventures it analyses why, despite five wars, India's vexed territorial and border disputes have remained unresolved.
Later chapters critically dilate on a range of weighty issues related to the armed forces such as their apolitical nature, India's strategic culture, state of the civil-military relations, absence of a defence policy, ad hoc defence planning et al, and how these have acted as set back forces for the Services. One of the chapters debates the pros and cons of a coup in India and yet another one exhorts the armed forces to introspect. The book closes with a set of assertions that would keep the armed forces ready and relevant to match the national aspirations of rising India.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru