You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
THE STORY BEHIND THE MAN WHO RECEIVED HIS HOLINESS THE DALAI LAMA IN 1959 1857, coerced by the East India Company, Ram, a young low- profile astrologer, flees Awadh because he dares to predict about a Gora Sahib and the East India Company. He struggles hard to reach Assam. Takes the humongous river route, largely in a row boat from Allahabad to Tezpur via Chittagong, sailing across, the mighty Ganges-Padma-Brahmaputra-Meghna, the Bay of Bengal and then to Tezpur, again via the Bay of Bengal, Meghana, Padma and the Brahmaputra changing a dozen row boats. Later, Kalachakra … the wheel of time settles the karmic scores in this ‘Root to Karma-Bhoomi’ story by giving his progeny Kamakhya Prasad Tripathi, then a minister in the Assam Cabinet, the lifetime opportunity to receive the Dalai Lama on behalf of the Government of India when he flees Tibet with his retinue on 18th April 1959. The narration unfolds the golden conversation between Dalai Lama and Kamakhya Prasad Tripathi hitherto not told.
Get to grips with modern sophisticated attacks, their intrusion life cycles, and the key motivations of adversaries, and build the most effective cybersecurity incident preparedness, response, remediation, and prevention methodologies Key Features Explore contemporary sophisticated cyber threats, focusing on their tactics, techniques, and procedures Craft the most robust enterprise-wide cybersecurity incident response methodology, scalable to any magnitude Master the development of efficient incident remediation and prevention strategies Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionCybersecurity incidents are becoming increasingly common and costly, making i...
Launch and enhance your cybersecurity program by adopting and implementing the NIST Cybersecurity Framework 2.0 Key Features Leverage the NIST Cybersecurity Framework to align your program with best practices Gain an in-depth understanding of the framework's functions, tiering, and controls Conduct assessments using the framework to evaluate your current posture and develop a strategic roadmap Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionDiscover what makes the NIST Cybersecurity Framework (CSF) pivotal for both public and private institutions seeking robust cybersecurity solutions with this comprehensive guide to implementing the CSF, updated to cover the l...
Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategy Key Features Learn how to tackle endpoint security problems in your organization Apply practical guidance and real-world examples to harden endpoint security Implement EDR/XDR tools for optimal protection of digital assets Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIn this data-driven age, safeguarding sensitive data and privacy has become paramount, demanding a deep understanding of the intricacies of cyberspace and its associated threats. With a focus on endpoint defense, Endpoi...
Explore the depths of AWS security and learn how to design, implement, and maintain a secure cloud environment using state-of-the-art AWS technology Key Features Expand your knowledge with new concepts and technologies tailored for various use cases in this second edition Design and deploy secure AWS environments based on modern architectural principles Elevate your AWS security expertise with advanced techniques for automation and continuous improvement Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIf you’re trying to navigate the complex world of AWS security and fortify your organizational cloud environment, then this book is for you. Written by an accom...
Explore cloud economics and cost optimization for Azure, AWS, and GCP with this practical guide covering methods, strategies, best practices, and real-world examples, bridging theory and application Key Features Learn cost optimization best practices on different cloud services using FinOps principles and examples Gain hands-on expertise in improving cost estimations and devising cost reduction plans for Azure, AWS, and GCP Analyze case studies that illustrate the application of FinOps in diverse real-world scenarios Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIn response to the escalating challenges of cloud adoption, where balancing costs and maximizing c...
Gain the skills and knowledge to manage your core network services on Red Hat Enterprise Linux with help of self-tests and practical use cases Key FeaturesGet the EX358 certification with this easy-to-follow guide while preparing for real-life challengesLearn everything you need to know about Linux system administration and automation using Ansible 2.9Use practical use cases and exam-focused questions to prepare for the certification examBook Description If you're ready to take the next step in your system engineering career with the EX358, then this book is for you. Packed with all the knowledge and skills that you need to configure and maintain services and applications on the Red Hat Linu...
Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscape Key Features Get introduced to three primary AI tactics used in malware and detection Leverage data science tools to combat critical cyber threats Understand regulatory requirements for using AI in cyber threat management Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIn today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data...
Quickly deliver microservices with CodeCommit, CodeBuild, CodeDeploy, and CodePipeline using software architecture patterns, microservices, and release pipelines Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn software architecture and microservices design patterns from an AWS certified professional architect Develop microservices using Spring Boot and automate the release using CodePipeline Deploy microservices using CodeDeploy to EC2 instances, containers, and on premises Book DescriptionReliable automation is crucial for any code change going into production. A release pipeline enables you to deliver features for your users efficiently and promptly. AWS C...
Leverage cloud technologies, proven strategies, and effective frameworks to drive seamless digital transformation. Key Features Understand the challenges enterprises face with cloud adoption and the importance of leadership vision Learn how to build the foundation for a vendor agnostic cloud-ready enterprise Discover best practices to architect an enterprise cloud strategy and responsibly innovate with emerging technologies Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIn the past decade, cloud technology has evolved from a mere deployment platform into a driving force of innovation. However, navigating the complexities of cloud adoption, especially with a hy...