Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Above the Board: How Ethical CEOs Create Honest Corporations
Above the Board: How Ethical CEOs Create Honest Corporations
In recent years, a string of corporate scandals have sent shockwaves throughout the business world, resulting in the fracture of public trust in corporations. Now more than ever, corporate honesty and integrity are directly connected to success and growth. Above the Board provides strategies and methods to help you build a solid foundation...
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

Learning Puppet Security
Learning Puppet Security

Secure your IT environments with the powerful security tools of Puppet

About This Book

  • Pass a compliance audit by showing the concrete state of your systems using Puppet
  • Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

The Guru's Guide to Transact-SQL
The Guru's Guide to Transact-SQL
This is a coder's book. It's intended to help developers build applications that make use of Transact-SQL. It's
not about database administration or design. It's not about end-user or GUI application development. It's not
even about server or database performance tuning. It's about developing the best Transact-SQL code
possible,
...
Pro SQL Server 2008 Policy-Based Management
Pro SQL Server 2008 Policy-Based Management

Pro SQL Server 2008 Policy-Based Management is critical for database administrators seeking in-depth knowledge on administering servers using the new policy-based management features introduced in SQL Server 2008. This book will cover everything from a basic introduction to policy-based management to creating your own custom policies...

Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

This book is about expanding Internet business risk management strategies into resilience such as software diversity; into financial risk transfer instruments such as insurance policies, catastrophe bonds, performance bonds, and self-insurance as in Basel II; and into reputation systems.

Traditional Internet performance and...

Special Edition Using Microsoft Expression Web 2
Special Edition Using Microsoft Expression Web 2
Special Edition Using Microsoft® Expression® Web 2

 

The only EXPRESSION WEB 2 book you need

 

The successor to the best-selling book on the first release of Microsoft Expression Web, this book provides comprehensive...

Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

Fisma Certification & Accreditation Handbook
Fisma Certification & Accreditation Handbook
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.

This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three
...
The Art of Rails (Programmer to Programmer)
The Art of Rails (Programmer to Programmer)
There is a certain state of mind, a certain transient condition that arises, where everything seems to resonate and effort becomes effortless. Athletes call it being in the zone, some others call it flow. Flow has nothing to do with triumph or accomplishment; it isn’t the product of your labors. Flow is the merging of a watchmaker and his...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy