 |
|
 Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Overview
-
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
-
Explore the insights and importance of testing your corporate network systems before the hackers strike
-
Understand the...
|  |  Beginning Fedora Desktop: Fedora 20 Edition
Beginning Fedora Desktop: Fedora 20 Edition is a complete guide to using the Fedora 20 Desktop Linux release as your daily driver for multimedia, productivity, social networking, the GNOME 3 desktop, administrative tasks, and more. Author and Linux expert Richard Petersen delves into the operating system as a whole and offers you a... |  |  WebRTC Blueprints
Develop your very own media applications and services using WebRTC
Overview
-
Create interactive web applications using WebRTC
-
Get introduced to advanced technologies such as WebSocket and Erlang
-
Develop your own secure web applications and services with practical projects
... |
|
 How Linux Works: What Every Superuser Should Know
Unlike some operating systems, Linux doesn't try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.
In this completely revised second... |  |  Always Use Protection: A Teen's Guide to Safe Computing
Dan Appleman's career is typical of someone who, unable to choose what he wants to do for a living, decides to do everything. From founding a software company (Desaware), to cofounding a publishing company (Apress), to programming, to writing books (this is his seventh), he's a Brm believer that the question 'What do ... |  |  |
|
 Practical Linux Infrastructure
Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.
... |  |  The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of... |  |  Learning VMware vCloud Air
Leverage VMware's latest public cloud offering to build an efficient hybrid cloud infrastructure for your business
About This Book
-
Create, deploy, and manage virtualized workloads on a public cloud platform using VMware vCloud Air
-
Dive into the world of VMware vCloud and discover the...
|
|
 Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... |  |  Learning Puppet Security
Secure your IT environments with the powerful security tools of Puppet
About This Book
-
Pass a compliance audit by showing the concrete state of your systems using Puppet
-
Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
|  |  IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating... |
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |