Certified Ethical Hacker (CEH) Foundation Guide
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...
Cascading Style Sheets: The Designer's Edge
CSS is finally supported by all modern web browsers, empowering web designers to do what they’ve been hungering to do for years: control layout more precisely, use color more effectively, and expand typographic options beyond the frustrating limitations of the past. So where to begin? Where can you get design-focused instruction on CSS...
Web Hacking: Attacks and Defense
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...
Citrix XenApp Platinum Edition for Windows: The Official Guide
The Authorized Guide to Citrix XenApp Platinum Edition for Windows
Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs...
Combating Spyware in the Enterprise Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... CCIE Security Exam Certification Guide (CCIE Self-Study)
Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
|Result Page: 6 5 4 3 2 1 |