Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Research on Information Security and Assurance
Handbook of Research on Information Security and Assurance

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...

Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit...
Mac OS X Power Tools
Mac OS X Power Tools
Expert Dan Frakes Toiled Endlessly with OS X So You Don't Have To...

OS X expert and incurable Mac addict Dan Frakes delved into the deepest, darkest regions of Apple's newest operating system to uncover the best and most efficient ways to get things done. The result of his tireless efforts, Mac OS X Power Tools,...

Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)
Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)

Dream the perfect computer system, then build it to run on a Linux live CD!


A Linux live CD is more than just a Linux system you carry around. Start with...

Ubuntu: The Complete Reference (Complete Reference Series)
Ubuntu: The Complete Reference (Complete Reference Series)

The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS

Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up...

Linux(R) Quick Fix Notebook (Bruce Perens Open Source)
Linux(R) Quick Fix Notebook (Bruce Perens Open Source)
An indispensable guide for every Linux administrator

Instant access to precise, step-by-step solutions for every essential Linux administration task

From basic configuration and troubleshooting to advanced security and optimization

If you're responsible for delivering results with Linux, Linux® Quick Fix Notebook brings...

Pro Nagios 2.0 (Expert's Voice in Open Source)
Pro Nagios 2.0 (Expert's Voice in Open Source)
Who Should Read This Book?
This book is an introductory guide to Nagios 2.0. It presumes no prior knowledge of Nagios
and indeed focuses entirely (with minor digressions) on the current version of Nagios.Itis
designed for system administrators,operations managers,IT managers,and support staff
...
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
For many organizations their dependence on information systems, both within the company
and networked up and down their supply chain, is now business critical. Any sustained loss
of availability of these systems would threaten the very existence of the business.

Security is a holistic issue. Vulnerabilities in physical,
...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Absolute OpenBSD: UNIX for the Practical Paranoid
Absolute OpenBSD: UNIX for the Practical Paranoid

The definitive guide to OpenBSD

Foreword by Henning Brauer, OpenBSD PF Developer

OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy