Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Deploying Node.js
Deploying Node.js

Learn how to build, test, deploy, monitor, and maintain your Node.js applications at scale

About This Book

  • Gain comprehensive information on scaling Node.js both vertically and horizontally in the cloud and across virtual machines
  • Learn how to use Gulp, Mocha, Chai, PhantomJS, Git,...
Microsoft Exchange Server 2003 24seven
Microsoft Exchange Server 2003 24seven
Advanced Coverage for Experienced Exchange Administrators

Microsoft Exchange Server 2003 24seven doesn't try to take you back to square one. Instead, it builds on the knowledge you've already earned. Expert Jim McBee with assistance from Barry Gerber delivers targeted instruction and inside tips that will help you...

Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
The Sun™ ONE Messaging Server Practices and Techniques for Enterprise Customers book is published under the auspices of the Sun BluePrints™ program. This book is a collection of practices and techniques for deploying a messaging system. These practices and techniques have been gathered from many...
Mastering Microsoft Exchange Server 2007
Mastering Microsoft Exchange Server 2007

By utilizing the latest features of Microsoft Exchange Server 2007, you'll be able to provide your company with the security it needs while enabling employees to access critical information regardless of their location or type of device.

Now with this comprehensive guide, you'll find out how to effectively install, configure, and manage...

Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)
Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)

What you’ll learn

  • A comprehensive set of best practices for administering Exchange Server 2013 on a daily basis.
  • A thorough understanding of new features.
  • How to design and deploy new Exchange 2013 servers and upgrade existing Exchange servers to Exchange 2013.
  • Learn best...
Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Novell's Guide to Troubleshooting eDirectory (Novell Press)
Novell's Guide to Troubleshooting eDirectory (Novell Press)
Novell eDirectory (formerly Novell Directory Services- NDS) is employed by system administrator to define users on the network and links those same users to their access rights with corporate resources, devices like printers and security policies. Novell eDirectory is comparable to Microsoft's Active Directory and is designed for large-scale,...
Getting Started with Microsoft Application Virtualization 4.6
Getting Started with Microsoft Application Virtualization 4.6

Every organization, no matter what the business involved, to achieve efficiency needs efficient people working for them. For a long time now, operating systems and applications have represented important tools in the work of these people and organizations. And if we are not capable of providing users with the proper tools, gaining an...

Learning Apache Karaf
Learning Apache Karaf

Develop and deploy applications using the OSGi-based runtime container, Apache Karaf

Overview

  • Understand Apache Karaf's commands and control capabilities
  • Gain familiarity with its provisioning features
  • Explore various application deployments targets experientially
  • ...
Microsoft Office 2003 Editions Resource Kit
Microsoft Office 2003 Editions Resource Kit

Whether you’re a small business or a global organization, deploy and support Microsoft Office 2003 Editions with expertise direct from the Microsoft Office product team. This official Resource Kit packs the in-depth technical information you need to customize and install Office, plan and implement messaging with Microsoft...

Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)
Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)

This book provides an in-depth analysis of UK-US intelligence cooperation in the post-9/11 world.

Seeking to connect an analysis of intelligence liaison with the wider realm of Anglo-American Relations, the book draws on a wide range of interviews and consultations with key actors in both countries. The book is centred around two...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy