Home | Amazing | Today | Tags | Publishers | Years | Search 
ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
The Book of Ruby: A Hands-On Guide for the Adventurous
The Book of Ruby: A Hands-On Guide for the Adventurous

Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.

...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard
Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard

In the first edition of this book, we focused on what we called the "High Availability Database Administrator." However, that term led G to the question of just what is meant by High Availability? As a term bandied about among database administrators, this can have different meanings depending on who is interpreting it, who has to...

Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)

Let’s just look it right in the eye and call it out. We in the IT industries have been barraged with the buzzwords over and over again since we rolled into the new millennium: the transition to utility computing, or grid computing, or cloud computing (depending on the source/exact month/position of the stars in the sky). We’ve...

Oracle Database Administration for Microsoft SQL Server DBAs
Oracle Database Administration for Microsoft SQL Server DBAs

Apply Your SQL Server DBA Skills to Oracle Database Administration

Use your SQL Server experience to set up and maintain a high-performance Oracle Database environment. Written by a DBA with expertise in both platforms, Oracle Database Administration for Microsoft SQL Server DBAs illustrates each technique with clear...

The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits
The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits

“I’ve been trading stocks and commodities for more than 30 years, and I’ve read any number of how-to books, but George Kleinman’s The New Commodity Trading Guide is as clear, precise, and useful as any book I’ve come across during my career. I cannot recommend it strongly enough, if...

Spring Security 3
Spring Security 3

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Handbook of Loss Prevention and Crime Prevention, Fourth Edition
Handbook of Loss Prevention and Crime Prevention, Fourth Edition
Security breaches, theft, and lack of resources due to natural or man-made disaster are all forms of corporate loss. The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, shows how to avoid or minimize these losses with a wealth of practical information.
This revised volume brings together the expertise of
...
The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
VHDL may sound like a new Internet language, but it really stands for VHSIC (Very High Speed Integrated Circuit) Hardware Definition Language. VHDL borrows ideas from software engineering (architectural, behavior, and formal models, as well as modular design) and is used to design today's custom integrated circuits, from cell phones to...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy