Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Practical Oracle Database Appliance
Practical Oracle Database Appliance

Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration.  Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various...

Git : Best Practices Guide
Git : Best Practices Guide

Master the best practices of Git with the help of real-time scenarios to maximize team efficiency and workflow

About This Book

  • Work with a versioning tool for continuous integration using Git
  • Learn how to make the best use of Git's features
  • Comprehensible guidelines...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
The Real Sexy, Smart and Strong: 30 Tips to Boost Confidence, Get Fit and Feel Great, Inside and Out
The Real Sexy, Smart and Strong: 30 Tips to Boost Confidence, Get Fit and Feel Great, Inside and Out

"My life’s passion is to connect people all over the world with their success potential. Patch’s book confirms just how smart exercise is—for your success and for keeping every part of your life in top condition. A must-read for everyone!"
—Jack Canfield, Co-creator, of The Success
...

Intellectual Property and Open Source: A Practical Guide to Protecting Code
Intellectual Property and Open Source: A Practical Guide to Protecting Code
"Clear, correct, and deep, this is a welcome addition to discussions of law and computing for anyone -- even lawyers!" -- Lawrence Lessig, Professor of Law at Stanford Law School and founder of the Stanford Center for Internet and Society

If you work in information technology, intellectual property is central to your job -- but...

Digital Electronics for Musicians
Digital Electronics for Musicians

This is the perfect book for musicians who want to dive into the world of computer music and physical computing. This book is aimed at adventurous musicians who want to learn about music programming with Arduino, sensors, and Pure Data, and how to make new interfaces and even new instruments with that knowledge.

You’ll
...

Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy