Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Microsoft® Exchange Server 2007 Administrator's Companion
Microsoft® Exchange Server 2007 Administrator's Companion
Get your mission-critical messaging and collaboration systemsup and running with the essential guide to deploying and managing ExchangeServer 2007. This comprehensive administrator's reference covers the fullrange of server and client deployments, unified communications, messagingsecurity, performance optimization, troubleshooting, and disaster...
IT Compliance and Controls: Best Practices for Implementation
IT Compliance and Controls: Best Practices for Implementation
Praise for IT Compliance and Controls

"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen."
—Dr. Richard Reiner, founder,
...

Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP Certified Information Systems Security Professional Study Guide

Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological...

Security+ Study Guide
Security+ Study Guide
Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides

The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test
...
CCSE NG: Check Point Certified Security Expert Study Guide
CCSE NG: Check Point Certified Security Expert Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

CISSP Study Guide, Second Edition
CISSP Study Guide, Second Edition

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common Body of Knowledge. The ten domains are covered completely and as...

MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server 2008 Network Infrastructure (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server 2008 Network Infrastructure (PRO-Certification)
Announcing an all-new Self-Paced Training Kit designed to help maximize your performance on 70-642, the required exam for the new Microsoft® Certified Technology Specialist (MCTS): Windows Server 2008 Networking Infrastructure Configuration certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy