Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Microsoft  SharePoint  Products and Technologies Administrator's Pocket Consultant
Microsoft SharePoint Products and Technologies Administrator's Pocket Consultant

Get fast answers for the day-to-day administration of Windows SharePoint Services 3.0 and Office SharePoint Server 2007. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to get the job done-whether you’re at your desk or in the field!

...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Network Performance Toolkit: Using Open Source Testing Tools
Network Performance Toolkit: Using Open Source Testing Tools
All of the tools you’ll need to ensure that your network and its applications are performing properly for your environment

As a network administrator, you are the first person customers come to whenever there are performance issues with the network. You have to keep the customers satisfied, but the complaints don’t make your job...

Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Solr 1.4 Enterprise Search Server
Solr 1.4 Enterprise Search Server
If you are a developer building a high-traffic web site, you need to have a terrific search engine. Sites like Netflix.com and Zappos.com employ Solr, an open source enterprise search server, which uses and extends the Lucene search library. This is the first book in the market on Solr and it will show you how to optimize your web site for high...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Using Docker: Developing and Deploying Software with Containers
Using Docker: Developing and Deploying Software with Containers

Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development...

Cell Death: Mechanism and Disease
Cell Death: Mechanism and Disease

Beginning from centuries of anecdotal descriptions of cell death, such as those on the development of the midwife toad in 1842 by Carl Vogt, to modern-day investigations of cell death as a biological discipline, it has become accepted that cell death in multicellular organisms is a normal part of life. This book provides a comprehensive...

Smart and Gets Things Done: Joel Spolsky's Concise Guide to Finding the Best Technical Talent
Smart and Gets Things Done: Joel Spolsky's Concise Guide to Finding the Best Technical Talent
A guide to attracting, recruiting, interviewing, and hiring the best technical talent.
  • A comprehensive system for hiring top-notch technical employees
  • Packed with useful information and specific advice written in a breezy, humorous style
  • Learn how to find great people--and get them to work for you--in an...
Propellants and Explosives: Thermochemical Aspects of Combustion
Propellants and Explosives: Thermochemical Aspects of Combustion

Explosives and propellants contain considerable chemical energy that can be converted into rapid expansion. In contrast to the simple burning of a fuel, explosives and propellants are self-contained and do not need an external supply of oxygen via air. Since their energy content inherently creates the risk of accidental triggering of the...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy