Home | Amazing | Today | Tags | Publishers | Years | Search 
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,...

Microsoft  Windows  Small Business Server 2003 R2 Administrator's Companion
Microsoft Windows Small Business Server 2003 R2 Administrator's Companion
Get comprehensive information to deploy, manage, and troubleshoot Microsoft Windows Small Business Server 2003 R2 for messaging and collaboration, Internet access, database storage, printing, faxing, support for line-of-business applications, and end-to-end network administration.

The first time you noticed Microsoft...

Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Solaris Solutions for System Administrators: Time-Saving Tips, Techniques, and Workarounds, Second Edition
Solaris Solutions for System Administrators: Time-Saving Tips, Techniques, and Workarounds, Second Edition
Learn how to work smart and avoid common pitfalls of managing Solaris systems

The Solaris operating system is used by hundreds of thousands of companies worldwide to run everything from Web services to back-end financial systems. The Solaris 9 release improves manageability; however, it also increases the complexity of the operating environment...

Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Migrating from Exchange Server to qmail
Migrating from Exchange Server to qmail
This book provides a broad coverage of all the strategic and technical intricacies of migrating an existing Exchange server setup to run on GNU/Linux operating system, using qmail.

qmail is a robust Internet MTA for Unix and Unix-like operating systems. With an ever-increasing popularity of GNU/Linux as a server...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Windows Server Hacks
Windows Server Hacks
The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,...
Windows Server 2003/2000 Thin Client Solutions
Windows Server 2003/2000 Thin Client Solutions

This book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy