Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Getting Started with Windows Server Security
Getting Started with Windows Server Security

Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

About This Book

  • Learn how to identify and mitigate security risks in your Microsoft Server infrastructure
  • Develop a proactive approach to common security threats to prevent sensitive data...
System Center Operations Manager (OpsMgr) 2007 R2 Unleashed
System Center Operations Manager (OpsMgr) 2007 R2 Unleashed

This up-to-the-minute supplement to System Center Operations Manager 2007 Unleashed brings together practical, in-depth information about System Operations Manager 2007, including major enhancements introduced with the R2 release, as well as essential information on other products and technologies OpsMgr integrates...

Result Page: 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy