Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ansible Playbook Essentials
Ansible Playbook Essentials

Design automation blueprints using Ansible's playbooks to orchestrate and manage your multitier infrastructure

About This Book

  • Get to grips with Ansible's features such as orchestration, automatic node discovery, and data encryption
  • Create data-driven, modular and reusable...
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Introducing Windows 8: An Overview for IT Professionals (Introducing (Microsoft))
Introducing Windows 8: An Overview for IT Professionals (Introducing (Microsoft))
The Windows 8 operating system is the newest member of the Microsoft Windows family. It differs from earlier Windows releases as much for what it does not change as for what it does change. That is, the features that IT pros loved about Windows 7 are still there in Windows 8—just better. The same keyboard shortcuts,...
Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
An implementer’s guide to setting up, configuring, and managing a secure wireless network

Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Wrox's Visual Basic 2005 Express Edition Starter Kit (Programmer to Programmer)
Wrox's Visual Basic 2005 Express Edition Starter Kit (Programmer to Programmer)
The practical, task-oriented approach, along with numerous tips, tricks, and additional techniques, all help to get you up to speed on the most important Visual Basic 2005 concepts and information. In no time, you'll be able to take control of your programming, apply what you've learned in real world scenarios, and get quick results.

...

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...

Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Computer Forensics For Dummies (Computer/Tech)
Computer Forensics For Dummies (Computer/Tech)
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master...
Advanced DBA Certification Guide and Reference for DB2 UDB v8 for Linux, Unix and Windows
Advanced DBA Certification Guide and Reference for DB2 UDB v8 for Linux, Unix and Windows
Whether you're a long-time DB2 UDB professional or an experienced DBA who's migrated from another database platform, there's one sure way to demonstrate the highest level of skills in DB2 Universal Database administration: pass the challenging IBM DB2 Universal Database Advanced Database Administration Exam 704.

Now, there's a definitive guide...

CCIE Routing and Switching Exam Certification Guide
CCIE Routing and Switching Exam Certification Guide
The official preparation guide for the new CCIE Routing and Switching written examCCIE Routing and Switching Exam Certification Guide is a comprehensive study and assessment tool. Written and reviewed by CCIEs and developed with the assistance of the CCIE program manager, this book is appropriate preparation for the new CCIE Routing and Switching...
Developing Microsoft .NET Controls with Microsoft Visual Basic .NET
Developing Microsoft .NET Controls with Microsoft Visual Basic .NET

Every click on a menu item or a dialog box—every interaction with a control—shapes the user’s experience and satisfaction with your software. Learn how to maximize the usability and impact of your Visual Basic .NET-based solutions by using the powerful intrinsic controls in the .NET Framework right out of the box—or by...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy