Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
The Definitive Guide to SUSE Linux Enterprise Server 12
The Definitive Guide to SUSE Linux Enterprise Server 12

The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments....

Java 9 Revealed: For Early Adoption and Migration
Java 9 Revealed: For Early Adoption and Migration
Explore the new Java 9 modules, SDK, JDK, JVM, JShell and more in this comprehensive book that covers what’s new in Java 9 and how to use these new features. Java 9 Revealed is for experienced Java programmers looking to migrate to Java 9.  Author Kishori Sharan begins by covering how to develop Java...
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity

Create simple to advanced shell scripts and enhance your system functionality with effective recipes

Key Features

  • Automate tedious and repetitive tasks
  • Create several novel applications ranging from a simple IRC logger to a Web Scraper
  • Manage your system...
Microsoft Windows Security Resource Kit
Microsoft Windows Security Resource Kit

Welcome to the Microsoft Windows Security Resource Kit. This book provides detailed information about security features in Microsoft Windows 2000 and Microsoft Windows XP and explains how to better secure computers running these operating systems. This book also provides information on managing security and privacy on...

BEA Weblogic(R) Server Bible
BEA Weblogic(R) Server Bible
WebLogic Server is an industrial−strength application server developed and marketed by BEA Systems, Inc.
of San Jose, California. WebLogic is a pure−Java implementation of the Java 2 Platform, Enterprise Edition,
more commonly known as J2EE. J2EE represents Sun’s serious effort to make Java a powerful platform for...
Wireless Home Networking for Dummies
Wireless Home Networking for Dummies
Pick the right equipment, secure your network, and share files

Share your Internet connection, access hot spots, and add on cool wireless peripherals

Thinking of going wireless? It’s not as scary as it sounds! This fast and fun guidebook helps you decide what you need, install it, and get the most from all its cool options....

Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will...

Microsoft SharePoint 2010 PerformancePoint Services Unleashed
Microsoft SharePoint 2010 PerformancePoint Services Unleashed

This is a comprehensive, expert guide to all facets of planning, deploying, managing, and utilizing the brand-new SharePoint 2010 PerformancePoint Services. Authored by business and technical experts and a key member of the Microsoft PerformancePoint Services development team, this book demonstrates exactly how to apply...

Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference
Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference

On behalf of the Organizing Committees, it is our pleasure towelcome you to the proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application (STA 2011),which was held in Loutraki, Greece, June 28–30, 2011.

STA 2011 was the first conference after the merger of the...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

CompTIA Network+ Lab Manual (Exam N10-005)
CompTIA Network+ Lab Manual (Exam N10-005)

Gain street-smart skills in network administration

Think of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + Lab Manual provides an inside look into the field of network administration as though you were...

unlimited object storage image
Result Page: 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy