Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Security (Java Series)
Java Security (Java Series)

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with...

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Hardware Hacking Projects for Geeks
Hardware Hacking Projects for Geeks

Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Networks: Optimisation and Evolution (Cambridge Series in Statistical and Probabilistic Mathematics)
Networks: Optimisation and Evolution (Cambridge Series in Statistical and Probabilistic Mathematics)
Point-to-point vs. hub-and-spoke. Questions of network design are real and involve many billions of dollars. Yet little is known about optimizing design - nearly all work concerns optimizing flow assuming a given design. This foundational book tackles optimization of network structure itself, deriving comprehensible and realistic design principles....
Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Computer Networking First-Step
Computer Networking First-Step

Your first step into the world of computer networking

  • No experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy