Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

Head First PHP & MySQL (A Brain-Friendly Guide)
Head First PHP & MySQL (A Brain-Friendly Guide)
If you're ready to create web pages more complex than those you can build with HTML and CSS, Head First PHP & MySQL is the ultimate learning guide to building dynamic, database-driven websites using PHP and MySQL. Packed with real-world examples, this book teaches you all the essentials of server-side programming, from the fundamentals...
Developing with Couchbase Server
Developing with Couchbase Server

Today’s highly interactive websites pose a challenge for traditional SQL databases—the ability to scale rapidly and serve loads of concurrent users. With this concise guide, you’ll learn how to build web applications on top of Couchbase Server 2.0, a NoSQL database that can handle websites and social media where...

ARIS Design Platform: Getting Started with BPM
ARIS Design Platform: Getting Started with BPM
This practical "how-to" guide to both using the ARIS Design Platform and, more importantly, how to use it to create real business models, follows Rob Davis’ hugely successful, Business Process Modelling with ARIS (Springer 2001). This second volume describes the ARIS Business Architect and ARIS Business Designer web clients...
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

How to Cheat at Microsoft Vista Administration
How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,
...
Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Introduction to 3D Game Programming with DirectX 10
Introduction to 3D Game Programming with DirectX 10
Introduction to 3D Game Programming with DirectX 10 provides an introduction to programming interactive computer graphics, with an emphasis on game development, using DirectX 10. The book is divided into three main parts. Part I explores basic mathematical tools, Part II shows how to implement fundamental tasks in Direct3D, and Part III...
Cascading Style Sheets: The Designer's Edge
Cascading Style Sheets: The Designer's Edge

CSS is finally supported by all modern web browsers, empowering web designers to do what they’ve been hungering to do for years: control layout more precisely, use color more effectively, and expand typographic options beyond the frustrating limitations of the past. So where to begin? Where can you get design-focused instruction on CSS...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy