Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
Encyclopedia of Islam & the Muslim World
Encyclopedia of Islam & the Muslim World
A growing number of scholars and pundits have declared that the twenty-first century will be the era of Islam. Such predictions, whether intended in a positive or negative light, err in failing to appreciate the spread and influence of Islam during the past millennium and a half, especially on the continents of Asia and Africa. Nonetheless, events...
Hacking for Dummies
Hacking for Dummies
Find out if your system is vulnerable to hack attacks!

"The coverage of security topics in this book can help you avoid a hack attack."
— Stuart McClure

"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat...

Essential PHP Security
Essential PHP Security

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Expert SQL Server 2008 Encryption
Expert SQL Server 2008 Encryption

Every day organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL...

Corporate Computer Security (3rd Edition)
Corporate Computer Security (3rd Edition)
The IT security industry has seen dramatic changes in the past decades. Security breaches, data theft, cyber attacks, and information warfare are now common news stories in the mainstream media. IT security expertise that was traditionally the domain of a few experts in large organizations has now become a concern for almost...
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000

Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,...

Dungeons & Dragons  Dummies
Dungeons & Dragons Dummies
Caught in traffic. Trapped in a cubicle. Stuck in a rut.  Tangled up in red tape.

In the real world, sometimes you feel powerless—but not in Dungeons & Dragons (D & D). In this fantasy-adventure, you have all kinds of special powers. You can slay the evil dragon, overcome the orc or the ogre, haunt the...

unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy