|
|
|
|
| | Snort for DummiesFind out how to foil an attack on your network
Choose the right way to deploy and configure Snort — no experience required!
Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you... | | Business Intelligence with MicroStrategy Cookbook
Over 90 practical, hands-on recipes to help you build your MicroStrategy business intelligence project, including more than a 100 screencasts
Overview
-
Learn about every step of the BI project, starting from the installation of a sample database
-
Design web reports and documents
- ...
|
|
The Shellcoder's Handbook: Discovering and Exploiting Security HolesUncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This... | | Quick! Show Me Your ValueTrainers and other workplace learning and performance professionals have long sought a seat at the executive table. But getting this powerful seat has always been an illusive goal.
Quick! Show Me Your Value is the first book designed specifically to help these professionals confidently communicate their true value at the most... | | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,... |
|
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |