Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Macworld's Mac Security Superguide
Macworld's Mac Security Superguide

Macworld's Mac Security Superguide

Keep your data and computer safe.

The expert team of Macworld editors share their knowledge in this essential guide to keep your computer, your network, and your personal information safe and secure; further your head start when it comes to malware, get tips to keep your...

Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM
Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM

With a focus on connectivity, clients, and unified messaging, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Paul Robichaux, a Microsoft MVP and popular author, you will:

  • Understand how Exchange Server 2013 works with previous...
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is...

grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference
Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference

You're beyond the basics, so dive right into troubleshooting Windows 7 -- and really put your PC to work! This supremely organized reference describes hundreds of prevention tips, troubleshooting techniques, and recovery tools in one essential guide. It's all muscle and no fluff. Discover how the experts keep their...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms

Investigate, analyze, and report iOS, Android, and Windows devices

Key Features

  • Get hands-on experience in performing simple to complex mobile forensics techniques
  • Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Dictionary of Information Security
Dictionary of Information Security

IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy