Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshoot and Optimize Windows 8 Inside Out: The ultimate, in-depth troubleshooting and optimizing reference
Troubleshoot and Optimize Windows 8 Inside Out: The ultimate, in-depth troubleshooting and optimizing reference

You’re beyond the basics, so dive right into optimizing Windows® 8—and really put your PC or tablet to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting techniques, and workarounds. It’s all muscle and no fluff. Discover how the experts keep their Windows 8 systems...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine

"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine

"For almost any computer book, you can find a...

Mastering System Center Configuration Manager
Mastering System Center Configuration Manager

Master how to configure, back up, and secure access to System Center Configuration Manager with this practical guide

About This Book

  • Employ fast and scalable on-demand application deployment
  • Discover the best practices to utilize faster and more efficient anti-malware scanning of...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

 
   
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy