Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
Solaris™ 10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the...
As Professor Owen H Wangensteen, one of the greatest academic surgeons of the 20th century, said: You are a true surgeon from the moment you are able to deal with your complications. Prompt and accurate diagnosis, as well as effective treatment, of surgical complications is one of the most important elements of surgical practice. This is...
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's...
The best fully integrated study system available for the CompTIA Security+ exam!
Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...
Welcome to Teach Yourself Database Programming with Visual Basic 5 in 21 Days, Second
Edition. You cover a lot of ground in the next 21 lessons-from developing fully functional
input screens with fewer than 10 lines of Visual Basic code and writing Visual Basic code
libraries, to handling complex user security and auditing in...
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...