Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Sams Teach Yourself Database Programming with Visual C++ 6 in 21 Days
Sams Teach Yourself Database Programming with Visual C++ 6 in 21 Days
In only 21 days, you'll have all the skills you need to get up and running efficiently. With this complete tutorial, you'll master the basics of database programming and then move on to the more advanced features and concepts. Understand the fundamentals of database programming in Visual C++. Master all the new and advanced database features that...
Excel 2010 For Dummies Quick Reference
Excel 2010 For Dummies Quick Reference

Find the answers to your most important Excel questions with this reference

John Walkenbach’s name is synonymous with excellence in computer books that decipher complex technical topics. Known as "Mr. Spreadsheet," Walkenbach—along with Excel expert Colin Banfield—answers your most common and...

CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP Certified Information Systems Security Professional Study Guide

Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological...

Excel 2003 Formulas
Excel 2003 Formulas
Everything you need to know about
  • Mastering operators, error values, naming techniques, and absolute versus relative references
  • Debugging formulas and using the auditing tools
  • Importing and exporting XML files and mapping the data to specific cells
  • Using Excel 2003’s rights management...
Emergency Planning for Industrial Hazards
Emergency Planning for Industrial Hazards
Recent events worldwide have again highlighted the need for effective emergency measures for hazards connected with the process industries and the large scale storage of dangerous substances. The Commission of the European Communities, DG XI, in collaboration with the JRC Ispra Establishment, has therefore organised the...
Getting Started with Windows Server Security
Getting Started with Windows Server Security

Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

About This Book

  • Learn how to identify and mitigate security risks in your Microsoft Server infrastructure
  • Develop a proactive approach to common security threats to prevent sensitive data...
Mastering Nmap Scripting Engine
Mastering Nmap Scripting Engine

Master the Nmap Scripting Engine and the art of developing NSE scripts

About This Book

  • Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
  • Learn the fundamentals of Lua programming
  • Develop powerful scripts for the Nmap Scripting...
Apache Camel Developer's Cookbook (Solve Common Integration Tasks With Over 100 Easily Accessible Apache Camel Recipes)
Apache Camel Developer's Cookbook (Solve Common Integration Tasks With Over 100 Easily Accessible Apache Camel Recipes)

For Apache Camel developers, this is the book you'll always want to have handy. It's stuffed full of great recipes that are designed for quick practical application. Expands your Apache Camel abilities immediately.

Overview

  • A practical guide to using Apache Camel delivered in dozens of small,...
Nessus Network Auditing, Second Edition
Nessus Network Auditing, Second Edition
In the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy