Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Forensics: A Pocket Guide
Computer Forensics: A Pocket Guide

Computer forensics has become an essential tool in the identification of misuse and abuse of systems. Whilst widely utilised within law enforcement, the rate of adoption by organisations has been somewhat slower, with many organisations focusing upon the traditional security countermeasures to prevent an attack from occurring in the first...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

It's Never Done That Before: A Guide to Troubleshooting Windows XP
It's Never Done That Before: A Guide to Troubleshooting Windows XP
Most computer problems aren’t that violent or that dramatic, but the
immediate result is often the same: you sit there in a state of shock, staring at
the computer, saying to yourself, “What happened? What should I do now?
It’s never done that before!” This book will tell you how to understand and
fix
...
Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living together out of wedlock can mean anything, especially in court -- unlike married couples, most unmarried couples don't automatically inherit or receive protection under the law. Consequently, you must document everything from property ownership and children to wills and other estate plans.

An essential resource for any unmarried couple,...

Windows Server 2008 How-To
Windows Server 2008 How-To

Real Solutions for Windows Server 2008 Administrators

 

Need fast, reliable, easy-to-implement solutions for Microsoft Windows Server 2008? This book delivers exactly what you’re looking for. You’ll find tested, step-by-step procedures for...

Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
A hands-on guide to testing techniques that deliver reliable software and systems

Testing even a simple system can quickly turn into a potentially infinite task. Faced with tight costs and schedules, testers need to have a toolkit of practical techniques combined with hands-on experience and the right strategies...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy