Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

The HP Virtual Server Environment: Making the Adaptive Enterprise Vision a Reality in Your Datacenter
The HP Virtual Server Environment: Making the Adaptive Enterprise Vision a Reality in Your Datacenter
Use HP virtualization to maximize IT service quality, agility, and value
  • Includes coverage of HP's new Integrity Virtual Machines, Global Workload Manager, Virtualization Manager, and Capacity Advisor

  • Plan, implement, and manage virtualization to drive maximum business...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

The Little Book of Trading: Trend Following Strategy for Big Winnings
The Little Book of Trading: Trend Following Strategy for Big Winnings

How to get past the crisis and make the market work for you again

The last decade has left people terrified of even the safest investment opportunities. This fear is not helping would-be investors who could be making money if they had a solid plan. The Little Book of Trading teaches the average person rules...

VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Apache Axis2 Web Services
Apache Axis2 Web Services

SOA, in practicality web services, is becoming the enabler for application integration. Since the introduction of web services, Apache Software Foundation has played a major role and produced several good web services frameworks. This book covers the defector Java Web Service framework, also known as Apache Axis2. This book covers several...

Instant Microsoft Forefront UAG Mobile Configuration Starter
Instant Microsoft Forefront UAG Mobile Configuration Starter

UAG provides your employees, clients, or partners secure remote access to your vital corporate resources, while delivering a seamless integration with your existing network environment. UAG is able to optimize content for different mobile devices, and is also able to publish complex applications in a simple manner. You are also able to...

Visual Studio Lightswitch 2012
Visual Studio Lightswitch 2012

LightSwitch 2012 is included as part of the Visual Studio 2012 package. It is a rapid application deployment tool that lets power users and administrators build data-centric business applications for the desktop, cloud, and Web in just a few clicks, with no code required. The basics are very easily understood but more advanced users will...

unlimited object storage image
Result Page: 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy