Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning the Linux Command Line
Beginning the Linux Command Line

This is Linux for those of us who don’t mind typing. All Linux users and administrators tend to like the flexibility and speed of Linux administration from the command line in byte–sized chunks, instead of fairly standard graphical user interfaces. Beginning the Linux Command Line is verified against all of the most...

Getting Started with Windows Server Security
Getting Started with Windows Server Security

Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

About This Book

  • Learn how to identify and mitigate security risks in your Microsoft Server infrastructure
  • Develop a proactive approach to common security threats to prevent sensitive data...
Advanced Java Game Programming
Advanced Java Game Programming

Advanced Java Game Programming teaches you how to create desktop and Internet computer games using the latest Java programming language techniques. Whereas other Java game programming books focus on introductory Java material, this book covers game programming for experienced Java developers.

David Wallace...

Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Learning SPARQL
Learning SPARQL

More and more people are using the query language SPARQL (pronounced “sparkle”) to pull data from a growing collection of public and private data. Whether this data is part of a semantic web project or an integration of two inventory databases on different platforms behind the same firewall, SPARQL is making it easier to access...

MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring
MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring

MCTS Windows 7 Configuring Cert Guide (Exam 70-680) is designed for network administrators, network engineers, and consultants who are pursuing the Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified IT Professional (MCITP) certifications for Windows 7. This book covers the “TS: Microsoft Windows...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Working with Microsoft FAST Search Server 2010 for SharePoint
Working with Microsoft FAST Search Server 2010 for SharePoint
Should you care about search? The answer is “Yes!” However, the reason you should care constantly changes. Back in 1997 when FAST was founded, most people viewed search as a mature and commoditized technology. AltaVista was the leader in web search and Verity had won the enterprise search race. Internet...
pfSense 2 Cookbook
pfSense 2 Cookbook

pfSense is an open source distribution of FreeBSD-based firewall which provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options which, compared to other offerings, makes determining requirements a little more difficult and a lot more important....

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy