Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Administrating Solr
Administrating Solr

Master the use of Drupal and associated scripts to administrate, monitor, and optimize Solr

Overview

  • Learn how to work with monitoring tools like OpsView, New Relic, and SPM
  • Utilize Solr scripts and Collection Distribution scripts to manage Solr
  • Employ search features like...
Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

PHP & MySQL For Dummies 3rd edition (Computer/Tech)
PHP & MySQL For Dummies 3rd edition (Computer/Tech)
Build an online catalog and a members-only site

Everything you need to know to create a dynamic PHP and MySQL Web site!

Been thinking of creating a high-quality interactive Web site? This book is just what you need to get started! Here's the fun and easy way(r) to develop a Web application in PHP 4, 5, or 6 and
...
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...

MySQL Pocket Reference: SQL Functions and Utilities
MySQL Pocket Reference: SQL Functions and Utilities

To help you be more efficient in your work, this handy pocket reference gives you instant reminders on how to use important MySQL functions, especially in conjunction with key parts of the LAMP open source infrastructure. This powerful database system is so rich in features that no administrator or programmer can stay familiar with all of...

Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Sams Teach Yourself Microsoft Windows 7 in 10 Minutes
    Sams Teach Yourself Microsoft Windows 7 in 10 Minutes

    Sams Teach Yourself Microsoft Windows® 7 in 10 Minutes gives you straightforward, practical answers when you need fast results. By working through its 10-minute lessons, you’ll learn how to get more done with Windows 7…get it done quicker with no hassle…and have more fun along the way!

    ...
    Codes and Cryptography
    Codes and Cryptography

    This text unifies the concepts of information, codes and cryptography as first studied by Shannon in his seminal papers on communication and secrecy systems. The first five chapters cover the fundamental ideas of information theory, compact encoding of messages and the theory of error-correcting codes. After a discussion of mathematical...

    Understanding Network Hacks: Attack and Defense with Python
    Understanding Network Hacks: Attack and Defense with Python

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

    Sams Teach Yourself Samba in 24 Hours (2nd Edition)
    Sams Teach Yourself Samba in 24 Hours (2nd Edition)
    When Linux or Unix gets adopted by computing groups that already have users working with a version of the Windows platform, administrators overseeing the network integration of the two operating systems look to Samba to make a connection. Sams Teach Yourself Samba in 24 Hours furnishes 24 one-hour essential lessons geared toward...
    Securing PHP Apps
    Securing PHP Apps

    Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

    Is your PHP app truly secure? Let's make sure you get home...

    unlimited object storage image
    Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
    ©2021 LearnIT (support@pdfchm.net) - Privacy Policy