Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hardening Azure Applications
Hardening Azure Applications

Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.

This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability...

Hardening Apache
Hardening Apache

A must-read for any system administrator installing or currently using Apache, Hardening Apache shows you exactly what to do to make Apache more secure. Throughout this book, renowned author Tony Mobily introduces you to many of the security problems you’ll inevitably stumble across when using Apache---and most important,...

Hadoop Operations and Cluster Management Cookbook
Hadoop Operations and Cluster Management Cookbook

We are facing an avalanche of data. The unstructured data we gather can contain many insights that could hold the key to business success or failure. Harnessing the ability to analyze and process this data with Hadoop is one of the most highly sought after skills in today's job market. Hadoop, by combining the computing and storage powers...

Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
The main purpose of the present manuscript addresses the development of techniques for the evaluation and the hardening of designs implemented on SRAM-based Field Programmable Gate Arrays against the radiation induced effects such as Single Event Upsets (SEUs) or Soft-Errors (SEs). The perspective of the analysis and the design flows proposed in...
Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Result Page: 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy