Home | Amazing | Today | Tags | Publishers | Years | Search 
Magento: Beginner's Guide - Second Edition
Magento: Beginner's Guide - Second Edition

As a non-techie you might be a bit daunted at the thought of taking on an e-commerce system as powerful as Magento. But don't be - our guide makes it all so accessible with its user-friendly, absolute-beginner approach.

  • Install, configure, and manage your own e-commerce store
  • Extend and customize your...
MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)
MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)

The study guide helps you master all the topics on the MCSA 70-410 exam, including the following:

  • Installing and configuring Windows Server 2012
  • Configuring storage, shares, and permissions
  • ...
Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2 (MCSA)
Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2 (MCSA)

Fully updated for Windows Server 2012 R2! Prepare for Microsoft Exam 70-410 - and help demonstrate your real-world mastery of implementing and configuring core services in Windows Server 2012 R2. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision making acumen...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Beginning Perl (Programmer to Programmer)
Beginning Perl (Programmer to Programmer)

Perl is an immensely popular scripting language that combines the best features of C, key UNIX utilities and a powerful use of regular expressions. It has a wide range of uses beyond simple text processing and is commonly used for web programming - creating and parsing CGI forms, validating HTML syntax and hyperlinks - as well as e-mail and...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
SQL Primer: An Accelerated Introduction to SQL Basics
SQL Primer: An Accelerated Introduction to SQL Basics

Modern society is driven by data. Whether it is at a personal level, like a notebook containing scribbled notes; or at a countrywide level like Census data, it has permeated all our workflows. There is always a growing need to efficiently store and organize it so that meaningful information can be extracted out of raw data.

A
...

Visual C++(r).NET Developer's Guide
Visual C++(r).NET Developer's Guide
This is the hard-core resource for serious developers. Coverage includes ADO, ADO+, Acrive Directory, Security, trheads, attributed programming, ATL, web forms, and a complete overview of integration with the .NET platform....
Rust Standard Library Cookbook: Over 75 recipes to leverage the power of Rust
Rust Standard Library Cookbook: Over 75 recipes to leverage the power of Rust

Explore the Rust Standard library and compose algorithms with minimal dependency on external libraries

Key Features

  • Develop high-quality, fast, and portable applications by leveraging the power of Rust's Standard library.
  • Practical recipes that will help you work with...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy