Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Server 2012: Up and Running
Windows Server 2012: Up and Running
Windows Server 2012 is not only the most significant update to the Windows Server operating system in recent years, but it is also all about cloud computing and the underlying technology for building clouds: virtualization.

Many features familiar to administrators of Server 2008 R2 and other legacy
...
Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Handbook of Transcription Factor NF-kappaB
Handbook of Transcription Factor NF-kappaB

Recent evidence proving the molecular link between unchecked, chronic inflammation and cancer has implicated the transcription factor NF-kB as a key factor in both inhibiting apoptosis and promoting cell proliferation. Since its initial identification 20 years ago as a simple regulating factor in one small part of the immune response, NF-kB...

Beginning HTML5 and CSS3: The Web Evolved
Beginning HTML5 and CSS3: The Web Evolved

Beginning HTML5 and CSS3 is your introduction to the new features and elements of HTML5—as a web developer you'll learn about all the leaner, cleaner, and more efficient code available now with HTML5, along with some new tools that will allow you to create more meaningful and richer content. For everyone involved in web...

Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

IMechE Engineers' Databook
IMechE Engineers' Databook
This significantly updated 2012 edition of the Engineers’Data Book replaces the three successful previous editions published in 1998, 2000 and 2004. Since the data book’s inception, feedback from engineers and students has indicated that, despite the proliferation of technical information in published and...
Interventions for Autism Spectrum Disorders: Translating Science into Practice
Interventions for Autism Spectrum Disorders: Translating Science into Practice

Children are being diagnosed with autism spectrum disorders at a staggering rate—as many as one in 110, according to some studies. To this sobering statistic add the familiar figures of the toddler disengaged from his peers, the middle schooler shunned in the lunchroom, and the adult struggling with social cues on the job, and...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Adobe Edge Animate CC For Dummies
Adobe Edge Animate CC For Dummies

The easy way to build HTML5 mobile and web apps using Adobe's new Edge Animate CC

Edge Animate CC is an approachable WYSIWYG alternative for leveraging the power of languages like HTML5, CSS3, and JavaScript to design and develop for the web and mobile devices, even if you have no programming experience. Written by...

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Instant Burp Suite Starter
Instant Burp Suite Starter

Get up and running with Burp Suite using this hands-on practical guide

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  •  
  • Intercept HTTP/S requests with Burp Proxy.
  • Tamper and analyze responses.
  • ...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy