|
|
|
|
Windows Server 2012 Pocket Consultant
Welcome to Windows Server 2012 Pocket Consultant. Over the years, I’ve written
about many different server technologies and products, but the one
product I like writing about the most is Microsoft Windows Server. For anyone transitioning
to Windows Server 2012 from an earlier release of Windows Server, ... | | Securing Hadoop
Implement robust end-to-end security for your Hadoop ecosystem
Overview
-
Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
-
Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
... | | CISA Certified Information Systems Auditor Study GuideTake charge of your career with CISA certification
Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS... |
|
|
|
Information Technology Control and Audit, Third EditionThe book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld. — Information Systems Control Journal
Now in its third edition, this book is an excellent introductory... | | IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has
changed in information technology (IT) auditing since we published our
first edition of this book when we were then called Computer Auditors. Back
in those days, traditional mainframe or legacy computer systems were still common, we
had difficulty envisioning... | | The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |