Home | Amazing | Today | Tags | Publishers | Years | Search 
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
Managing Cisco Network Security
Managing Cisco Network Security
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
Degunking Windows
Degunking Windows

All Windows users know that their PCs slowly develop problems—nasty gunk build-up that plagues their PCs. Here are some of the common symptoms: your PC starts to run slower, your applications will crash without warning, you can’t easily find your files and folders, you start getting tons of spam, and you encounter a host of other...

CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification
from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this
certification is to provide professional-level recognition to network engineers in the design and
implementation of Cisco secure networks. This
...
Microsoft  Windows  Small Business Server 2003 R2 Administrator's Companion
Microsoft Windows Small Business Server 2003 R2 Administrator's Companion
Get comprehensive information to deploy, manage, and troubleshoot Microsoft Windows Small Business Server 2003 R2 for messaging and collaboration, Internet access, database storage, printing, faxing, support for line-of-business applications, and end-to-end network administration.

The first time you noticed Microsoft...

MCSE Exam 70-296 Study Guide and DVD Training System
MCSE Exam 70-296 Study Guide and DVD Training System
So you want to be a Microsoft Certified Systems Engineer for Windows Server 2003? Not a bad idea.To stay competitive in today’s competitive IT world, you must not only possess the knowledge necessary to do your job, but you must also be able to prove to your employer (or potential employer) that you have the abilities and knowledge.The best...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
The Linux toyshop just added a new wing

Tired of playing with your old Linux toys? Wait 'til you see what Chris Negus has cooked up for you now! How about a Web-based Gallery server for sharing digital images over a network? A slick MythTV personal video recorder entertainment center? Automating gadgets and home lighting with X10? Or recycling...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
A Practical Guide to Red Hat(R) Linux(R): Fedora(TM) Core and Red Hat Enterprise Linux (3rd Edition)
A Practical Guide to Red Hat(R) Linux(R): Fedora(TM) Core and Red Hat Enterprise Linux (3rd Edition)

The Best Just Became BETTER—Again!Completely Revised to Meet All Your Fedora Core and Red Hat Enterprise Linux Needs!

Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that’s just as advanced. This book explains Linux clearly and...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy