Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Microsoft SQL Server 2008 Management and Administration
Microsoft SQL Server 2008 Management and Administration

SQL Server 2008 is Microsoft’s latest data platform providing data management and analytical solutions for the enterprise. The platform is trusted, ensures business continuity, and is more predictable and more scalable than ever before. Although similar to SQL Server 2005, SQL Server 2008 offers a tremendous number of new features and...

The Definitive Guide to SUSE Linux Enterprise Server 12
The Definitive Guide to SUSE Linux Enterprise Server 12

The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments....

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Using Microsoft Windows Small Business Server 2003
Using Microsoft Windows Small Business Server 2003
This is the fundamental, definitive reference to Microsoft Small Business Server 2003. And it is relevant for all audiences: for beginners just embracing the notion of computerizing their small businesses, to IT consultants specializing in SBS implementation and deployment.

The book focuses on pragmatic solutions, not drawn-out theoretical...

Protocols for Micropropagation of Woody Trees and Fruits
Protocols for Micropropagation of Woody Trees and Fruits

Micropropagation has become a reliable and routine approach for large-scale rapid plant multiplication, which is based on plant cell, tissue and organ culture on well defined tissue culture media under aseptic conditions. A lot of research efforts are being made to develop and refine micropropagation methods and culture media for large-scale...

Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network From Perimeter to Data
In this book, two senior members of Microsoft's Security and Business Technology Unit present a complete "Defense in Depth" model for protecting any Windows networkno matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security...
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks

The practical guide to large-scale networking with OSPF and IS-IS

This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy