Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Local Area Network Management, Design & Security
Local Area Network Management, Design & Security
Most workplaces rely on local area networks (LANs) to connect their computers and the right LAN is increasingly important in promoting effective communication both within the organisation and with the world at large.

Local Area Network Management, Design and Security is a practical and thorough introduction to managing and
...
Linux Cluster Architecture (Kaleidoscope)
Linux Cluster Architecture (Kaleidoscope)
Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how...
Distributed Work
Distributed Work
Technological advances and changes in the global economy are motivating and enabling an increasing geographic distribution of work. Today, the geographic distance between an average pair of workers is increasing in industries ranging from banking, to wine production, to clothing design. According to Bureau of Labor surveys of workers, more people...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Mastering ColdFusion MX
Mastering ColdFusion MX
This book is designed to teach you how to develop sophisticated, dynamic, and interactive websites by using ColdFusion.

ColdFusion, launched in 1995 by Allaire Corporation (now owned by Macromedia), was the first web application server available for Windows NT–based web servers. ColdFusion is now in a new version named MX, which is
...
Sams Teach Yourself Mac OS X Panther All In One
Sams Teach Yourself Mac OS X Panther All In One
Sams Teach Yourself Mac OS X Panther All in One is designed to teach, in one big book, the new Mac user how to easily work with his hardware, his operating system, and all the applications he is likely to want to use to work with digital media. The book does not assume the reader wants to learn how to use just one product, but covers multiple...
Modern Operating Systems (2nd Edition) (GOAL Series)
Modern Operating Systems (2nd Edition) (GOAL Series)
The widely anticipated revision of this worldwide best seller incorporates the latest developments in operating systems technologies. Hundreds of pages of new material on a wealth of subjects have been added. This authoritative, example-based reference offers practical, hands-on information in constructing and understanding modern operating...
Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

Postfix (Other Sams)
Postfix (Other Sams)
Networking guide to the Postfix Mail Transfer software package, showing how to configure Postfix for specific tasks, how to use external databases with Postfix, and how to migrate from Sendmail. Also explains e-mail protocols, setting up Postfix as an ISP or office mail server, and using list servers and Web mail interfaces with Postfix. Softcover....
Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
DB2 for Z/OS and Os/390: Ready for Java (IBM Redbooks)
DB2 for Z/OS and Os/390: Ready for Java (IBM Redbooks)

Read the following statements:

  • The earth is flat!

  • The earth is the center of the universe!

  • Men shall never fly!

  • Java will never work...

Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy