Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCENT Exam Cram (exam 640-822)
CCENT Exam Cram (exam 640-822)
This book includes a CD-ROM that features:
  • Complete coverage of CCENT exam objectives
  • Realistic exam questions for effective practice
  • Detailed explanations of correct and incorrect answers
  • Multiple exam modes
  • Flash Card format
  • An electronic copy of the book
  • ...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

Windows Vista Security: Securing Vista Against Malicious Attacks
Windows Vista Security: Securing Vista Against Malicious Attacks

It's not the computer. The hacker's first target is YOU!

A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and...

Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
What do you mean, you don’t have a passport? Why, it’s sitting right in your hands, even as you read! This book is your passport to a very special place.You’re about to begin a journey,my friend: a journey toward that magical place called certification! You don’t need a ticket, you don’t need a suitcase—just...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Todd Lammle's CCNA IOS Commands Survival Guide
Todd Lammle's CCNA IOS Commands Survival Guide
Let Todd Lammle help you master IOS commands for CCNA prep

To become a Cisco Certified Network Associate (CCNA), you must learn the hundreds of IOS commands used by Cisco routers and switches. This handy reference from Cisco networking authority Todd Lammle is just what you need to master those commands.

From a...

CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822 With CD)
CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822 With CD)
Expert exam prep from leading Cisco authority Todd Lammle

Start your preparation here for Cisco's new CCENT entry-level networking certification, your entry point into Cisco's popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the...

CEH Certified Ethical Hacker Study Guide
CEH Certified Ethical Hacker Study Guide

Prepare for the new version of CEH certification with this advanced guide

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy