Home | Amazing | Today | Tags | Publishers | Years | Search 
Hardening Network Infrastructure
Hardening Network Infrastructure
Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed, here is a brilliant new offering written with a passion for security that will help you make the necessary upgrades and take the essential steps to secure your network infrastructure. The concise and consistent approach...
Hardening Apache
Hardening Apache

A must-read for any system administrator installing or currently using Apache, Hardening Apache shows you exactly what to do to make Apache more secure. Throughout this book, renowned author Tony Mobily introduces you to many of the security problems you’ll inevitably stumble across when using Apache---and most important,...

Hardening Windows (Expert's Voice)
Hardening Windows (Expert's Voice)

System administrators know the Internet is a hostile environment. They can't tell when a hacker will attempt to gain access to the SQL server, but they can bet that there will be an attempt soon. Because the operating system is vital to a computer's functioning, and because it's the only layer between the machine's available resources and...

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
Outlook 2007: Beyond the Manual
Outlook 2007: Beyond the Manual
Many people use Outlook either by choice or by force, but few of them do more than scratch the surface of the personal information manager's many features. And after years of spending hours each day within Outlook, most users become at least proficient with its base features.

Outlook 2007: Beyond the Manual takes you to the next level,...

Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and...
Using Microsoft Windows Small Business Server 2003
Using Microsoft Windows Small Business Server 2003
This is the fundamental, definitive reference to Microsoft Small Business Server 2003. And it is relevant for all audiences: for beginners just embracing the notion of computerizing their small businesses, to IT consultants specializing in SBS implementation and deployment.

The book focuses on pragmatic solutions, not drawn-out theoretical...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy