Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Aptana Studio Beginner's Guide
Aptana Studio Beginner's Guide

Aptana Studio 3 is a powerful web development IDE based on the Eclipse platform and provides many innovative technologies and features for developing effective, modern hi-standard web-applications. Aptana has been around since 2008 and it provides language support for HTML, CSS, JavaScript, Ruby, Rails, PHP, Python, and many others by using...

Full Stack Web Development with Backbone.js
Full Stack Web Development with Backbone.js

Learn how to build a full-stack application with Backbone.js by taking advantage of JavaScript modules, workflow automation, and Backbone’s interface building blocks. With this practical guide, author Patrick Mulder takes experienced backend developers and JavaScript programmers through the steps necessary to create a fully...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
Oracle Siebel CRM 8 Installation and Management
Oracle Siebel CRM 8 Installation and Management

Oracle's Siebel CRM is market-leading Customer Relationship Management software. Unmatched in functionality and scalability, Siebel enhances a company's sales performance, improves customer satisfaction, and provides a robust Customer Relationship Management system for an organization.

This practical book offers a...

CCNP Security VPN 642-647 Official Cert Guide
CCNP Security VPN 642-647 Official Cert Guide

This book is designed to help you prepare for the Cisco VPN certification exam. The VPN exam is one in a series of exams required for the Cisco Certified Network Professional - Security (CCNP - Security) certification. This exam focuses on the application of security principles with regard to Cisco IOS routers,...

Plug-In CSS 100 Power Solutions
Plug-In CSS 100 Power Solutions
When the World Wide Web was first invented by Tim Berners-Lee, simply having a means to create hypertext links to other documents (including ones on remote computers), and to combine text and images using basic formatting, were revolutionary concepts that we take for granted today.

But slowly web developers started
...
Modern Operating Systems (3rd Edition) (GOAL Series)
Modern Operating Systems (3rd Edition) (GOAL Series)

A presentation of the basics of both distributed and single-processor computer systems, this book reflects real-world experience that provides practical, hands- on information in constructing and understanding modern operating systems. This book discusses the key principles of both kinds of systems — including MS- DOS, UNIX, Amoeba, and...

unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy