Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Microsoft Azure IAAS Essentials
Microsoft Azure IAAS Essentials

Design, configure, and build your cloud-based infrastructure using Microsoft Azure

About This Book

  • Deploy both Windows-based and Linux-based virtual machines to Microsoft Azure
  • Utilize SQL Server Azure to build a robust, highly available solution that can be recovered in the event of...
Automating Microsoft Azure with Powershell
Automating Microsoft Azure with Powershell

Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments

About This Book

  • Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
  • ...
RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Active Directory: Designing, Deploying, and Running Active Directory
Active Directory: Designing, Deploying, and Running Active Directory
Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling guide gives you a thorough grounding of Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.

...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
This book concentrates on three main challenges of video coding for mobile communications: higher coding efficiency, reduced computational complexity, and improved error resilience. Unlike other high level books and articles that focus on individual aspects in this field, this book has been designed as a quick, easy, and practical introduction to...
Perl 6 Fundamentals: A Primer with Examples, Projects, and Case Studies
Perl 6 Fundamentals: A Primer with Examples, Projects, and Case Studies
Gain the skills to begin developing Perl 6 applications from the ground up in this hands-on compact book, which includes a foreword from Larry Wall, creator of Perl. You’ll learn enough to get started building with Perl 6, using Perl 6’s gradual typing, handy object orientation features, powerful parsing capabilities, and...
Agile Web Development with Rails 4 (Pragmatic Programmers)
Agile Web Development with Rails 4 (Pragmatic Programmers)

Rails just keeps on changing. Both Rails 3 and 4, as well as Ruby 1.9 and 2.0, bring hundreds of improvements, including new APIs and substantial performance enhancements. The fourth edition of this award-winning classic has been reorganized and refocused so it's more useful than ever before for developers new to Ruby and Rails.
...

Automating System Administration with Perl: Tools to Make You More Efficient
Automating System Administration with Perl: Tools to Make You More Efficient

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely...

Perl for System Administration : Managing multi-platform environments with Perl
Perl for System Administration : Managing multi-platform environments with Perl
Some people plan to become administrators. The rest of us are thrust into it: we are webmasters, hobbyists, or just the default "technical people" on staff who are expected to keep things running. After some stumbling around repeating the same steps over and over again (and occasionally paying the price when we forget one), we realize...
Beginning Perl (Programmer to Programmer)
Beginning Perl (Programmer to Programmer)

Perl is an immensely popular scripting language that combines the best features of C, key UNIX utilities and a powerful use of regular expressions. It has a wide range of uses beyond simple text processing and is commonly used for web programming - creating and parsing CGI forms, validating HTML syntax and hyperlinks - as well as e-mail and...

Result Page: 39 38 37 36 35 34 33 32 31 30 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy