Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
CCIE Routing and Switching Practice Labs
CCIE Routing and Switching Practice Labs

Six comprehensive CCIE routing and switching labs to hone configuration and troubleshooting skills

Prepare for the CCIE lab exams and hone your configuration and troubleshooting skills with six complete practice scenarios that cover:

  • Frame Relay...

Subversion Version Control: Using the Subversion Version Control System in Development Projects (Bruce Perens Open Source)
Subversion Version Control: Using the Subversion Version Control System in Development Projects (Bruce Perens Open Source)

In any software development project, many developers contribute changes over a period of time. Using a version control system to track and manage these changes is vital to the continued success of the project. This book introduces you to Subversion, a free, open-source version control system, which is both more powerful and much less complex...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
CCIE Security Practice Labs (CCIE Self-Study)
CCIE Security Practice Labs (CCIE Self-Study)

The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...

Novell Cluster Services for Linux and NetWare (Novell Press)
Novell Cluster Services for Linux and NetWare (Novell Press)

Need to configure or manage Novell Cluster Services on NetWare, Linux or a mixed environment? Pick up a copy of the official reference guide, Novell Cluster Services for Linux and NetWare. This book blends in-depth information with practical, real world examples to cover cluster services configuration...

Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Optimizing Sales and Distribution in SAP ERP: Functionality and Configuration
Optimizing Sales and Distribution in SAP ERP: Functionality and Configuration
Any company selling products or services must have the ability to efficiently fulfill orders and deliver their products and services. An integrated sales and distribu tion system enables them to create contracts and agreements, acknowledge order receipt, fulfill orders, and provide accurate invoices. In today's competitive envi...
KNIME Essentials
KNIME Essentials

Perform accurate data analysis using the power of KNIME

Overview

  • Learn the essentials of KNIME, from importing data to data visualization and reporting
  • Utilize a wide range of data processing solutions
  • Visualize your final data sets using KNIME’s powerful data...
Hyper-V Replica Essentials
Hyper-V Replica Essentials

For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.

Overview

  • A practical step-by-step guide that goes beyond theory and...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy