Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fisma Certification & Accreditation Handbook
Fisma Certification & Accreditation Handbook
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.

This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three
...
Microsoft Vista for IT Security Professionals
Microsoft Vista for IT Security Professionals
This book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
The Perfect Reference for the Multitasked System Administrators
The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing
...
Software Piracy Exposed
Software Piracy Exposed
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software...
Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
Journey to the Center of the Internet: Now Showing in 3-D (Book & CD)
Journey to the Center of the Internet: Now Showing in 3-D (Book & CD)
Jules Verne watch out! Now you can take a virtual tour to the centre of a computer network.

If you need to know the difference between a router and a bridge, or a WAN and a LAN, where do you start? Journey to the Center of the Network: Now Showing in 3D is a truely innovative book and CD package. It introduces the reader to the highly
...
Wardriving & Wireless Penetration Testing
Wardriving & Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily
...
Designing and Building Enterprise DMZs
Designing and Building Enterprise DMZs
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.

One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a
...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy