Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration
This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.

This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting APIs and how they can be leveraged to
...
Windows Forensic Analysis DVD Toolkit
Windows Forensic Analysis DVD Toolkit
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and...
10 Cool LEGO Mindstorms Ultimate Builder Projects: Amazing Projects You Can Build in Under an Hour
10 Cool LEGO Mindstorms Ultimate Builder Projects: Amazing Projects You Can Build in Under an Hour
LEGO MINDSTORMS lets you design and program robots that can do just about anything!
You've just purchased the LEGO MINDSTORMS Ultimate Builder Kit. Now what? Overwhelmed by the creative possibilities? The Builder Kit is targeted towards those who want to become "master LEGO builders."

10 Cool LEGO MINDSTORM Ultimate
...
Consumer's Guide to Cell Phones & Wireless Service
Consumer's Guide to Cell Phones & Wireless Service
Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executive Experts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming...
RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders).

This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly
...
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the
...
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
ASP.net Web Developer's Guide (With CD-ROM)
ASP.net Web Developer's Guide (With CD-ROM)
Aimed at the working ASP developer who wants to move to Microsoft .NET, ASP.NET Unleashed: Web Developers Guide offers an excellent example-based programming tutorial. With its strong practical focus, this title offers an excellent choice for learning ASP.NET quickly.

Most every computer book uses examples illustrating programming...

Introduction to Fuzzy Logic using MATLAB
Introduction to Fuzzy Logic using MATLAB
The world we live in is becoming ever more reliant on the use of electronics and computers to control the behavior of real-world resources. For example, an increasing amount of commerce is performed without a single banknote or coin ever being exchanged. Similarly, airports can safely land and send off airplanes without ever looking out of a...
Zen and the Art of Information Security
Zen and the Art of Information Security
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy