 |
|
 Mastering Nmap Scripting Engine
Master the Nmap Scripting Engine and the art of developing NSE scripts
About This Book
-
Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
-
Learn the fundamentals of Lua programming
-
Develop powerful scripts for the Nmap Scripting...
|  |  Securing Hadoop
Implement robust end-to-end security for your Hadoop ecosystem
Overview
-
Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
-
Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
... |  |  Essential Windows NT System Administration
Windows NT systems are often said to "manage themselves." This book is for those times when things don't quite work out that way, when somebody who knows what's going on needs to intervene.Essential Windows NT System Administration helps you manage Windows NT systems as productively as possible, making the... |
|
|
 Instant Citrix Security How-to
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.
"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing... |  |  Pro SQL Server 2012 Administration (Professional Apress)
Pro SQL Server 2012 Administration is a one-stop source for all the knowledge you'll need to professionally manage a database under Microsoft SQL Server 2012. SQL Server administration is a complex field requiring an unusually broad and well-rounded skill set. A good database administrator must be part system... |  |  Microsoft Dynamics AX 2012 Security How-To
Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal... |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |