Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering UNIX Shell Scripting
Mastering UNIX Shell Scripting
Discover how to solve real-world system administration problems with this collection of end-to-end shell scripts

This comprehensive book takes you step-by-step through the process of writing shell scripts to solve real-world Unix problems and tasks. Each chapter begins by presenting a typical Unix challenge that you’ll most likely...

Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters is a game of tactical combat, or what some like to refer as a thinking shooter. Unlike most shooter games, which send a player through an essentially linear course, killing everything in sight, or others that require the player to find special keys or cards to get through a locked door, Freedom Fighters lets the player concentrate...
Seeing Dark Things: The Philosophy of Shadows
Seeing Dark Things: The Philosophy of Shadows
If a spinning disk casts a round shadow does this shadow also spin? When you experience the total blackness of a cave, are you seeing in the dark? Or are you merely failing to see anything (just like your blind companion)?

Seeing Dark Things uses visual riddles to explore our ability to see shadows, silhouettes, and black birds--plus
...
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams.

This two-in-one Study Guide provides:

  • In-depth coverage of all exam topics
  • Practical information on implementing Cisco's Secure PIX and Secure VPN technologies
  • ...
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
Secure PHP Development: Building 50 Practical Applications
Secure PHP Development: Building 50 Practical Applications
Your in-depth guide to designing and developing secure PHP applications

It’s a hacker’s dream come true: over one million Web sites are now vulnerable to attack through recently discovered flaws in the PHP scripting language. So how do you protect your site? In this book, bestselling author Mohammed Kabir provides all the tools...

Integration of WSNs into Internet of Things: A Security Perspective (Internet of Everything (IoE))
Integration of WSNs into Internet of Things: A Security Perspective (Internet of Everything (IoE))

The Internet has gone from an Internet of people to an Internet of Things (IoT). This has brought forth strong levels of complexity in handling interoperability that involves the integrating of wireless sensor networks (WSNs) into IoT. This book offers insights into the evolution, usage, challenges, and proposed countermeasures...

Inside the Spam Cartel
Inside the Spam Cartel

Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Network Security Hacks
Network Security Hacks

Nowhere is the term hacker more misconstrued than in the network security field. This is understandable because the very same tools that network security professionals use to probe the robustness of their own networks also can be used to launch attacks on any machine on the Internet. The...

Web Application Obfuscation
Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy