Home | Amazing | Today | Tags | Publishers | Years | Search 
CISSP All-in-One Exam Guide, Second Edition
CISSP All-in-One Exam Guide, Second Edition
This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP certification!

The Certified Information Systems Security Professional (CISSP) exam covers ten domains, each of which may be considered a full field of study in itself, with many individual books and papers
...
Pro CSS Techniques
Pro CSS Techniques

Pro CSS Techniques is the ultimate CSS book for the modern web developer. If youve already got web design and development basics under your belt, but want to take your knowledge to the next level and unleash the full power of CSS in your web sites, then this is the book for you. It is a collection of proven CSS techniques that you...

Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
PEERS, PIRATES, AND PERSUASION: RHETORIC IN THE PEER-TO-PEER DEBATES investigates the role of rhetoric in shaping public perceptions about a novel technology: peer-to-peer file-sharing networks. While broadband Internet services now allow speedy transfers of complex media files, Americans face real uncertainty about whether peer-to-peer file...
The Art and Science of CSS
The Art and Science of CSS
In the early days of CSS, many web designers associated it with boring, square boxes and thin borders. “CSS is ugly!” they would cry. It took projects such as CSS Edge1 and CSS Zen Garden2 to show the web design world that not only could CSS designs achieve the same aesthetic qualities of their table-based ancestors, but, furthermore,...
Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor
Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor
This cookbook contains ready-to-use hacks to solve problems Vim users encounter daily, from personalizing Vim to optimizations that boost productivity. It does not cover basic use of the editor but focuses on making life easier for experienced Vim users. Vim is a highly configurable, open-source, multi-platform text editor that is included as...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Learning Joomla! Extension Development: Creating Modules, Components, and Plugins with PHP
Learning Joomla! Extension Development: Creating Modules, Components, and Plugins with PHP
If you're a PHP programmer eager to create extensions for Joomla!, this book is for you. Written for Joomla! 1.5, it gets you coding your first extensions as quickly as possible, and adds features that will make your work look professional! The world's hottest open-source content management system, Joomla! won the 2006 Open Source CMS Prize....
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy