|
|
|
|
Network Security Evaluation: Using the NSA IEMAre you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop... | | Oracle Essbase & Oracle OLAP: The Guide to Oracle's Multidimensional SolutionWe have seen tremendous consolidation in the high-technology industry in recent years. Mergers and acquisitions strengthen the product offerings of a company, but they also sometimes bring together products that, on the face of it, seem either to duplicate a solution or to present no possibility of working together.
In 2007, Oracle... | | SPSS for Intermediate Statistics: Use and InterpretationThis book is designed to help students learn how to analyze and interpret research data with intermediate statistics. It is intended to be a supplemental text in an intermediate statistics course in the behavioral sciences or education and it can be used in conjunction with any mainstream text. We have found that the book makes SPSS for windows... |
|
|
|
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences ... | | Mastering PerlThis is the third in O'Reilly's series of landmark Perl tutorials, which started with Learning Perl, the bestselling introduction that taught you the basics of Perl syntax, and Intermediate Perl, which taught you how to create re-usable Perl software. Mastering Perl pulls everything together to show you how to bend Perl... | | C Traps and PitfallsC Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |