Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Nginx 1 Web Server Implementation Cookbook
Nginx 1 Web Server Implementation Cookbook

Nginx is an open source high-performance web server, which has gained quite some popularity recently. Due to its modular architecture and small footprint, it has been the default choice for a lot of smaller Web 2.0 companies to be used as a load-balancing proxy server. It supports most of the existing backend web protocols such as FCGI,...

Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

Implementing Netscaler VPX
Implementing Netscaler VPX

Leverage the features of NetScaler VPX™ to optimize and deploy responsive web services and applications on multiple virtualization platforms

Overview

  • Learn how to design, set up, and deploy Netscaler VPX in a virtual environment to make all your Web applications faster and secure
  • ...
Success Metrics: A Multidimensional Framework for Measuring Organizational Success
Success Metrics: A Multidimensional Framework for Measuring Organizational Success
Learn how to measure success at the individual and organizational levels. By measuring success in multiple dimensions using multivariate methods you will be able to determine what works and what doesn’t. The key is to measure and promote progress in terms of organizational vision, mission, and overarching goals.

Business
...
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best...

Squid Proxy Server 3.1: Beginner's Guide
Squid Proxy Server 3.1: Beginner's Guide

Squid proxy server enables you to cache your web content and return it quickly on subsequent requests. System administrators often struggle with delays and too much bandwidth being used, but Squid solves these problems by handling requests locally. By deploying Squid in accelerator mode, requests are handled faster than on normal web servers,...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Ubuntu Unleashed 2017 Edition (Includes Content Update Program): Covering 16.10, 17.04, 17.10 (12th Edition)
Ubuntu Unleashed 2017 Edition (Includes Content Update Program): Covering 16.10, 17.04, 17.10 (12th Edition)

Book + Content Update Program

Ubuntu Unleashed 2017 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly updated by a long-time Ubuntu community leader to reflect the exciting
...

Learning Python Design Patterns
Learning Python Design Patterns

Written for intermediate Python programmers, this excellent tutorial will help streamline your work through the use of Design Patterns. You'll learn through example and clear explanations to expand your know-how and speed up your output.

Overview

  • Explore the Model-View-Controller pattern and learn how...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy