Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2012 Pocket Consultant
Windows Server 2012 Pocket Consultant
Welcome to Windows Server 2012 Pocket Consultant. Over the years, I’ve written about many different server technologies and products, but the one product I like writing about the most is Microsoft Windows Server. For anyone transitioning to Windows Server 2012 from an earlier release of Windows Server,...
Securing Hadoop
Securing Hadoop

Implement robust end-to-end security for your Hadoop ecosystem

Overview

  • Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
  • Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
  • ...
CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

Take charge of your career with CISA certification

Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS...

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Microsoft Excel 2002 Formulas (With CD-ROM)
Microsoft Excel 2002 Formulas (With CD-ROM)
Excel 2002 Formulas Unleash the Power of Excel Formulas Now revised to cover the new features of Excel 2002 and expanded with two all-new chapters on financial formulas, this one-of-a-kind reference delivers all the tips and techniques you need to maximize one of the most powerful spreadsheet tools: formulas. With clear explanations of operators,...
SQL Server 2012 Data Integration Recipes: Solutions for Integration Services and Other ETL Tools (Expert's Voice in SQL Server)
SQL Server 2012 Data Integration Recipes: Solutions for Integration Services and Other ETL Tools (Expert's Voice in SQL Server)

SQL Server 2012 Data Integration Recipes provides focused and practical solutions to real world problems of data integration. Need to import data into SQL Server from an outside source? Need to export data and send it to another system? SQL Server 2012 Data Integration Recipes has your back. You'll find solutions...

Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000

Everything you need to know about

  • Implementing the new XML features in Spreadsheet Portals and Web Services
  • Auditing spreadsheets provided by third parties
  • Making spreadsheets accessible to individuals with disabilities
  • Performing spreadsheet makeovers
  • Constructing...
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
Wiley CPAexcel Exam Review 2015 Focus Notes: Auditing and Attestation
Wiley CPAexcel Exam Review 2015 Focus Notes: Auditing and Attestation

All the information you need to pass the CPA exam on your own

Updated annually with the latest AICPA content guidelines, Wiley CPAexcel Exam Review 2015 Focus Notes provides a review of all the basic skills and concepts tested on the CPA exam and teaches important strategies to take the exam faster and more...

Information Technology Control and Audit, Third Edition
Information Technology Control and Audit, Third Edition
The book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld.
Information Systems Control Journal

Now in its third edition, this book is an excellent introductory
...
IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy