Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
RSA Security's Official Guide to Cryptography
Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...
Automating Microsoft Azure with Powershell
Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments
About This Book
Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
Mac OS X in a Nutshell Mac OS X is a stunning technical achievement--a virtually crash-proof Unix core paired with the sleek Aqua interface, bringing style, usability, and stability to a new level. It has almost everything that Macintosh fans have been waiting for: protected memory, crash resistance, and the ability to run the 18,000 existing Mac programs and an... Learning Vaadin
Having a command of the Vaadin framework means your Java web applications will look and perform brilliantly. Learn how with this all-inclusive, step-by-step tutorial to mastering Rich Internet Application development.
Discover the Vaadin framework in a progressive and structured...
Getting Started with Sun One Direct from Sun, this is your step-by-step guide to delivering high-value solutions based on Sun ONE technologies. Sun ONE technical specialist Stacy Thurston brings together Sun's best practices for planning, designing, configuring, integrating, and implementing Sun ONE Internet infrastructures. Drawing on his immense experience supporting Sun ONE...
Learning Apache Karaf
Develop and deploy applications using the OSGi-based runtime container, Apache Karaf
Understand Apache Karaf's commands and control capabilities
Gain familiarity with its provisioning features
Explore various application deployments targets experientially...
The ABCs of LDAP This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.
With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...
Linux System Programming: Talking Directly to the Kernel and C Library
Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code....
|Result Page: 39 38 37 36 35 34 33 32 31 30 |