Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Field Guide to Hadoop: An Introduction to Hadoop, Its Ecosystem, and Aligned Technologies
Field Guide to Hadoop: An Introduction to Hadoop, Its Ecosystem, and Aligned Technologies

If your organization is about to enter the world of big data, you not only need to decide whether Apache Hadoop is the right platform to use, but also which of its many components are best suited to your task. This field guide makes the exercise manageable by breaking down the Hadoop ecosystem into short, digestible sections....

Accountants' Handbook, Special Industries and Special Topics (Accountants' Handbook Vol. 2)
Accountants' Handbook, Special Industries and Special Topics (Accountants' Handbook Vol. 2)
The eleventh edition of Accountants’ Handbook continues the tradition established in the first edition over 82 years ago of providing a comprehensive single reference source for understanding current financial statement and reporting issues. It is directed to accountants, auditors, executives, bankers, lawyers, and other preparers and users...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

Nonprofit Bookkeeping & Accounting For Dummies (Wiley Finance)
Nonprofit Bookkeeping & Accounting For Dummies (Wiley Finance)
Counting the money in your wallet or purse is an act of accounting. If you ever make a note of how much you have, you’re even performing a bookkeeping function. You count things all the time in everyday life without thinking twice about accounting. For example, you count the plates before setting the table at home. You count the number of...
High Performance Cloud Auditing and Applications
High Performance Cloud Auditing and Applications

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of...

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a...
Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy