Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor
Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor
This cookbook contains ready-to-use hacks to solve problems Vim users encounter daily, from personalizing Vim to optimizations that boost productivity. It does not cover basic use of the editor but focuses on making life easier for experienced Vim users. Vim is a highly configurable, open-source, multi-platform text editor that is included as...
The Art and Science of CSS
The Art and Science of CSS
In the early days of CSS, many web designers associated it with boring, square boxes and thin borders. “CSS is ugly!” they would cry. It took projects such as CSS Edge1 and CSS Zen Garden2 to show the web design world that not only could CSS designs achieve the same aesthetic qualities of their table-based ancestors, but, furthermore,...
Wardriving & Wireless Penetration Testing
Wardriving & Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily
...
Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

MySQL (OTHER NEW RIDERS)
MySQL (OTHER NEW RIDERS)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a clarity and lucidity that inspires confidence in the subject matter: a (nearly) freely redistributable SQL-interpreting database client/server...
Developing More-Secure Microsoft  ASP.NET 2.0 Applications (Pro Developer)
Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)
Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible...
Secure Your Network for Free
Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for
...
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy