Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

High Performance Cloud Auditing and Applications
High Performance Cloud Auditing and Applications

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of...

Hybrid Cloud for Architects: Build robust hybrid cloud solutions using AWS and OpenStack
Hybrid Cloud for Architects: Build robust hybrid cloud solutions using AWS and OpenStack

Build your own hybrid cloud strategy with this comprehensive learning guide.

Key Features

  • Build a hybrid cloud strategy for your organization with AWS and OpenStack
  • Leverage Hybrid Cloud to design a complex deployment pipeline
  • Learn to implement security...
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

Practical Unix & Internet Security, Second Edition
Practical Unix & Internet Security, Second Edition
This book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum...
CCIE Professional Development: Large Scale IP Network Solutions
CCIE Professional Development: Large Scale IP Network Solutions
CCIE Professional Development: Large-Scale IP Network Solutions is a core textbook for preparation for the CCIE Routing and Switching exam track. As well as CCIE preparation, Large-Scale IP Network Solutions provides solutions for network engineers as IP networks grow and become more complex. The book discusses all major IP protocols in depth,...
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Managing the Windows NT Registry
Managing the Windows NT Registry

The Windows NT Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows NT Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book addresses four main areas:

  • What is the...
Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
Java EE 8 Development with Eclipse: Develop, test, and troubleshoot Java Enterprise applications rapidly with Eclipse, 3rd Edition
Java EE 8 Development with Eclipse: Develop, test, and troubleshoot Java Enterprise applications rapidly with Eclipse, 3rd Edition

Develop and deploy fully functional applications and microservices utilising Tomcat, Glassfish servers, Cloud and docker in Java EE 8

Key Features

  • Explore the complete workflow of developing enterprise Java applications
  • Develop microservices with Docker Container and...
unlimited object storage image
Result Page: 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy