Learning Microsoft Windows Server 2012 Dynamic Access Control
When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.
Understand the advantages of using Dynamic Access Control and how it...
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...
Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Learn key reconnaissance concepts needed as a penetration tester
Attack and exploit key features, authentication, and sessions on web...
Documenting Oracle Databases_ Complete Oracle Database Schema Auditing
Many times the Oracle DBA is hired once the database becomes to much to handle without one, inherits the position or is appointed to it “since they
are so good with computers”. In any case, they usually get an
undocumented system that follows no conventions and holds many traps
for the unwary DBA.
Android Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...
Learning Pentesting for Android Devices
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...
|Result Page: 17 16 15 14 13 12 11 10 9 8 |