Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth

Get your financial life in order. This comprehensive and objective guidebook will help you grow your net worth on a steady and increasing basis, regardless of your income level.

This new and expanded edition covers changes and strategies to maximize financial benefits and planning resulting from the recent tax legislation,
...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
PostGIS Cookbook - Second Edition: Store, organize, manipulate, and analyze spatial data
PostGIS Cookbook - Second Edition: Store, organize, manipulate, and analyze spatial data

Create and manage spatial data with PostGIS

Key Features

  • Import and export geographic data from the PostGIS database using the available tools
  • Maintain, optimize, and fine-tune spatial data for long-term viability
  • Utilize the parallel support functionality...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Self-Paced Training Kit (Exam 70-642) Configuring Windows Server 2008 Network Infrastructure (MCTS) (2nd Edition) (Microsoft Press Training Kit)
Self-Paced Training Kit (Exam 70-642) Configuring Windows Server 2008 Network Infrastructure (MCTS) (2nd Edition) (Microsoft Press Training Kit)

EXAM PREP GUIDE

Fully updated for Windows Server 2008 R2! Ace your preparation for the skills measured by Exam 70-642 - and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply your knowledge to real-world case scenarios and practice
...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Result Page: 46 45 44 43 42 41 40 39 38 37 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy