Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Using Windows 8.1: Return of the Start Button
Using Windows 8.1: Return of the Start Button

Using Windows 8.1 is the essential step by step guide to using a computer running Windows 8, providing a complete resource for both the beginner and the enthusiast.

Techniques are illustrated in step-by-step using photography and screen prints throughout, together with concise, easy to follow text from an established expert
...

Professional Windows Desktop and Server Hardening (Programmer to Programmer)
Professional Windows Desktop and Server Hardening (Programmer to Programmer)

Although not well known, Microsoft Windows has the best security of any popular operating system in the world today. What Windows has is poor default security. There are specific steps any professional can take to significantly increase the security of Microsoft Windows. Unfortunately, most books and the news media keep reinforcing the failed,...

What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
MCSA/MCSE 70-294 Exam Cram: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
MCSA/MCSE 70-294 Exam Cram: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
MCSA/MCSE 70-294 Exam Cram, Second Edition is the #1-selling quick-study guide to help you pass the 70-294 exam from Microsoft, which is one of the four core exams in the MCSE 2003 and MCSA 2003 certification programs. This new edition covers all exam objectives, including how to implement and manage an active...
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
  
   
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy