Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Becoming
Becoming
Do you remember your radio and "Captain Midnight," "The Lone Ranger," "Junior Miss" and "Let's Pretend"? The first time you inhaled a cigarette? Your first swallow of hard liquor? The thrill of the first exploration of the body of your boyfriend, girlfriend, husband, wife... your own body? Your first...
Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
MongoDB in Action
MongoDB in Action

Databases are the workhorses of the information age. Like Atlas, they go largely unnoticed in supporting the digital world we’ve come to inhabit. It’s easy to forget that our digital interactions, from commenting and tweeting to searching and sorting, are in essence interactions with a database. Because of this fundamental...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Spring Security 3
Spring Security 3

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn...

The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits
The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits

“I’ve been trading stocks and commodities for more than 30 years, and I’ve read any number of how-to books, but George Kleinman’s The New Commodity Trading Guide is as clear, precise, and useful as any book I’ve come across during my career. I cannot recommend it strongly enough, if...

Oracle Database Administration for Microsoft SQL Server DBAs
Oracle Database Administration for Microsoft SQL Server DBAs

Apply Your SQL Server DBA Skills to Oracle Database Administration

Use your SQL Server experience to set up and maintain a high-performance Oracle Database environment. Written by a DBA with expertise in both platforms, Oracle Database Administration for Microsoft SQL Server DBAs illustrates each technique with clear...

Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)

Let’s just look it right in the eye and call it out. We in the IT industries have been barraged with the buzzwords over and over again since we rolled into the new millennium: the transition to utility computing, or grid computing, or cloud computing (depending on the source/exact month/position of the stars in the sky). We’ve...

Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard
Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard

In the first edition of this book, we focused on what we called the "High Availability Database Administrator." However, that term led G to the question of just what is meant by High Availability? As a term bandied about among database administrators, this can have different meanings depending on who is interpreting it, who has to...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy