Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireshark® 101: Essential Skills for Network Analysis
Wireshark® 101: Essential Skills for Network Analysis

This book is written for beginner analysts and includes 46 step-by-step labs to walk you through many of the essential skills contained herein. This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a...

Windows Small Business Server 2011 Administrator's Companion
Windows Small Business Server 2011 Administrator's Companion

If you run a small business, you don’t need us to tell you that the highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands are constantly exerting pressure on your bottom line.

Your business needs the same technologies that large companies do. You need the...

Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Build the Ultimate Home Theater PC
Build the Ultimate Home Theater PC
The best of both worlds—now THIS is entertainment

You love tinkering with technology. The digital lifestyle is your lifestyle. So building your own Home Theater PC just might be as entertaining as using it. In these pages, a couple of fellow tinkerers explain the components and subsystems of a Home Theater PC and help you choose and pur-...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy