Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Macs For Dummies, Eighth Edition
Macs For Dummies, Eighth Edition
Release the power of Mac’s newest OS and multimedia tools!

Work with files, set up a printer, use the iLife® suite, get online, and more

The Mac has become famous as the world’s friendliest computer, but this handy guide will smooth out any rough spots that might arise in your relationship. It takes you from the...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Citrix XenApp Platinum Edition for Windows: The Official Guide
Citrix XenApp Platinum Edition for Windows: The Official Guide

The Authorized Guide to Citrix XenApp Platinum Edition for Windows

Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs...

CouchDB and PHP Web Development Beginner’s Guide
CouchDB and PHP Web Development Beginner’s Guide

PHP and CouchDB Web Development will teach you the fundamentals of combining CouchDB and PHP to create a full application from conception to deployment. This book will direct you in developing a basic social network, while guiding you through some of the common pitfalls that are frequently associated with NoSQL databases.

CouchDB...

Up to Speed with Swing
Up to Speed with Swing
Stephen Gutz's competent book about one of Java's graphical user interface (GUI)-building technologies covers everything you'd want in a Swing book--layouts, events, all the components, and more. Gutz focuses on the interface components, detailing buttons, text elements, and tables. Throughout, his code is clear and easy to follow, and a chapter...
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will...

CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)
HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)

Written for the IT staff in hospitals, this guide provides step-by-step direction on how to apply the required and addressable HIPAA Security implementation specifications into a comprehensive solution.

A “consensus project” of numerous computer security experts has culminated in a Guide for...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy