Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

WebRTC Blueprints
WebRTC Blueprints

Develop your very own media applications and services using WebRTC

Overview

  • Create interactive web applications using WebRTC
  • Get introduced to advanced technologies such as WebSocket and Erlang
  • Develop your own secure web applications and services with practical projects
  • ...
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.

If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Practical Linux Infrastructure
Practical Linux Infrastructure

Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.

...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's...

Red Hat Linux Bible: Fedora and Enterprise Edition
Red Hat Linux Bible: Fedora and Enterprise Edition
Use this comprehensive guide to harness the power of Red Hat Linux on a server, desktop, or laptop computer. Coverage includes desktop and server basics, simple, painless installations, Linux Shell, using VmWare, VNC, and more.

If Red Hat Linux can do it, you can do it too…

With Red Hat Linux separating into the open source...

Result Page: 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy