Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
CISSP All-in-One Exam Guide, 6th Edition
CISSP All-in-One Exam Guide, 6th Edition

A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris

Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by...

The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

MCTS Windows Server 2008 Active Directory Services Study Guide (Exam 70-640) (SET)
MCTS Windows Server 2008 Active Directory Services Study Guide (Exam 70-640) (SET)
The Best Fully Integrated Study System Available for Exam 70-640

With hundreds of practice questions and hands-on exercises, MCTS Configuring Windows Server 2008 Active Directory Study Guide covers what you need to know-and shows you how to prepare-for this challenging exam.

  • 100% complete...
Microsoft  SharePoint  Products and Technologies Administrator's Pocket Consultant
Microsoft SharePoint Products and Technologies Administrator's Pocket Consultant

Get fast answers for the day-to-day administration of Windows SharePoint Services 3.0 and Office SharePoint Server 2007. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to get the job done-whether you’re at your desk or in the field!

...
Asset Protection and Security Management Handbook
Asset Protection and Security Management Handbook
Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Wireless Networks For Dummies
Wireless Networks For Dummies
Cut the wires and stay connected almost anywhere

Assess your network needs, set up security, and take your office on the road

At last—liberation from that office full of electronic spaghetti is only a few pages away! This fun and friendly guide shows you how to plan and set up a wireless network for your business, install...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy