Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Essential Windows NT System Administration
Essential Windows NT System Administration

Windows NT systems are often said to "manage themselves." This book is for those times when things don't quite work out that way, when somebody who knows what's going on needs to intervene.Essential Windows NT System Administration helps you manage Windows NT systems as productively as possible, making the...

High Performance Cloud Auditing and Applications
High Performance Cloud Auditing and Applications

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of...

Saving the Corporate Board: Why Boards Fail and How to Fix Them
Saving the Corporate Board: Why Boards Fail and How to Fix Them
Ward reveals ten specific failings that are built into our boardroom model and provides real-world fixes to get boards back on track. Ward mixes tart, insightful analogies (what do boards have in common with volunteer fire departments, the U.S. electoral college . . . and Howard Hughes?) with proven nuts-and-bolts advice for putting any board back...
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

XML in 60 Minutes a Day
XML in 60 Minutes a Day
Get up and running with XML using this innovative virtual classroom approach!

Interested in mastering XML? This revolutionary book and companion online presentation take you through 16 one-hour lessons that quickly get you up to speed on many of XML’s capabilities. With this unique approach and real-world perspective, you’ll be able...

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy