 |
|
 Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |  |  Hacking Vim: A Cookbook to get the Most out of the Latest Vim EditorThis cookbook contains ready-to-use hacks to solve problems Vim users encounter daily, from personalizing Vim to optimizations that boost productivity. It does not cover basic use of the editor but focuses on making life easier for experienced Vim users. Vim is a highly configurable, open-source, multi-platform text editor that is included as... |  |  The Art and Science of CSSIn the early days of CSS, many web designers associated it with boring, square boxes and thin borders. “CSS is ugly!” they would cry. It took projects such as CSS Edge1 and CSS Zen Garden2 to show the web design world that not only could CSS designs achieve the same aesthetic qualities of their table-based ancestors, but, furthermore,... |
|
 Wardriving & Wireless Penetration TestingWireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily... |  |  Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... |  |  |
|
 MySQL (OTHER NEW RIDERS)The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a clarity and lucidity that inspires confidence in the subject matter: a (nearly) freely redistributable SQL-interpreting database client/server... |  |  Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible... |  |  Secure Your Network for FreeThis is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.
Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for... |
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |