Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Automating Microsoft Azure with Powershell
Automating Microsoft Azure with Powershell

Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments

About This Book

  • Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
  • ...
Getting Started with Red Hat Enterprise Virtualization
Getting Started with Red Hat Enterprise Virtualization

Leverage powerful Red Hat Enterprise Virtualization solutions to build your own IaaS cloud

About This Book

  • Build an agile, secure, and highly scalable virtualization foundation for your enterprise Linux and Windows workloads
  • Explore how Red Hat Enterprise Virtualization positions itself...
Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2 (MCSA)
Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2 (MCSA)

Fully updated for Windows Server 2012 R2! Prepare for Microsoft Exam 70-410 - and help demonstrate your real-world mastery of implementing and configuring core services in Windows Server 2012 R2. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision making acumen...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Mac OS X in a Nutshell
Mac OS X in a Nutshell
Mac OS X is a stunning technical achievement--a virtually crash-proof Unix core paired with the sleek Aqua interface, bringing style, usability, and stability to a new level. It has almost everything that Macintosh fans have been waiting for: protected memory, crash resistance, and the ability to run the 18,000 existing Mac programs and an...
Learning Vaadin
Learning Vaadin

Having a command of the Vaadin framework means your Java web applications will look and perform brilliantly. Learn how with this all-inclusive, step-by-step tutorial to mastering Rich Internet Application development.

Overview

  • Discover the Vaadin framework in a progressive and structured...
Getting Started with Sun One
Getting Started with Sun One
Direct from Sun, this is your step-by-step guide to delivering high-value solutions based on Sun ONE technologies. Sun ONE technical specialist Stacy Thurston brings together Sun's best practices for planning, designing, configuring, integrating, and implementing Sun ONE Internet infrastructures. Drawing on his immense experience supporting Sun ONE...
Learning Apache Karaf
Learning Apache Karaf

Develop and deploy applications using the OSGi-based runtime container, Apache Karaf

Overview

  • Understand Apache Karaf's commands and control capabilities
  • Gain familiarity with its provisioning features
  • Explore various application deployments targets experientially
  • ...
The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

Linux System Programming: Talking Directly to the Kernel and C Library
Linux System Programming: Talking Directly to the Kernel and C Library

Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.

...
Result Page: 39 38 37 36 35 34 33 32 31 30 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy