Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft System Center 2012 Unleashed
Microsoft System Center 2012 Unleashed

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and...

Business Case for Network Security : Advocacy, Governance, and ROI, The (Network Business)
Business Case for Network Security : Advocacy, Governance, and ROI, The (Network Business)

The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments....

Essential Microsoft Operations Manager
Essential Microsoft Operations Manager

Microsoft Operations Manager (MOM) 2005 can deliver a huge amount of value to organizations of any size. It automates burdensome and lengthy diagnostic tasks so that you are notified of an event in your environment almost as soon as it happens. Armed with this information, and a set of integrated tools engineered to help you fix...

Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

Bloodstain Pattern Analysis with an Introduction to Crime Scene Reconstruction, Third Edition (Practical Aspects of Criminal and Forensic Investigations)
Bloodstain Pattern Analysis with an Introduction to Crime Scene Reconstruction, Third Edition (Practical Aspects of Criminal and Forensic Investigations)
The goal of forensics and crime scene reconstruction is simply to seek the truth. The analyst has no other agenda. In pursuing this end, we revisit what we hope is a not too distant past and attempt to recreate the events that unfolded. This task is anything but simple and the tools employed are all of the forensic disciplines.

Each area
...
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Hacking Wireless Networks For Dummies (Computer/Tech)
Hacking Wireless Networks For Dummies (Computer/Tech)
Become a cyber-hero — know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
—Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient — not...

MCDST Self-Paced Training Kit (Exam 70-271): Supporting Users andTroubleshooting a Microsoft(r) Windows(r) XP Operating System, Second
MCDST Self-Paced Training Kit (Exam 70-271): Supporting Users andTroubleshooting a Microsoft(r) Windows(r) XP Operating System, Second
Now fully updated for Windows XP Service Pack 2, this all-in-one training kit provides in-depth preparation, practice, and review for one of two required exams for the Microsoft Desktop Support Technician Certification (MCDST). Covering Exam 70-271, this kit packs the tools and features exam candidates want most—including in-depth, self-paced...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
This unique and critical book shares no-fail secrets for building software and offers tried-and-true practices and principles for software design, development, and testing for mission-critical systems that must not fail. A veteran software architect walks you through the lifecycle of a project as well as each area of production...
  
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy