Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
The Complete Direct Investing Handbook: A Guide for Family Offices, Qualified Purchasers, and Accredited Investors (Bloomberg Financial)
The Complete Direct Investing Handbook: A Guide for Family Offices, Qualified Purchasers, and Accredited Investors (Bloomberg Financial)

The practical guide to direct investing strategies and best practices

The Complete Direct Investing Handbook provides comprehensive guidelines, principles and practical perspectives on this increasingly attractive private equity investment strategy. Interviews with leading family office investors, qualified private...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program (Green Energy and Technology)
Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program (Green Energy and Technology)

Why has the clean, limitless energy promised by fusion always seemed just out of reach?

Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program, explains the fundamentals and concepts behind fusion power, and traces the development of fusion historically by decade―covering its history as...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Red Hat Enterprise Linux Server Cookbook
Red Hat Enterprise Linux Server Cookbook

Key Features

  • Create fully unattended installations and deploy configurations without breaking a sweat
  • Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
  • Be guided by an experienced RHEL...
VBScript, WMI, and ADSI Unleashed: Using VBScript, WMI, and ADSI to Automate Windows Administration
VBScript, WMI, and ADSI Unleashed: Using VBScript, WMI, and ADSI to Automate Windows Administration
If you’re a Windows administrator, scripting expertise can liberate you from boring, repetitive work–so you can take on the sophisticated, high-value projects you really want. Top scripting guru Don Jones has written the definitive administrator’s guide to getting results with Microsoft’s key scripting technologies:...
Active Directory For Dummies (Computer/Tech)
Active Directory For Dummies (Computer/Tech)

Fully updated with all the exciting AD enhancements!

Design and deploy Active Directory to simplify policy and security management

This is not your dad's AD! Whether you just need to upgrade your knowledge from previous versions or you're starting fresh with Active Directory, this...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy