Home | Amazing | Today | Tags | Publishers | Years | Search 
Insider Threats in Cyber Security (Advances in Information Security)
Insider Threats in Cyber Security (Advances in Information Security)

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book...

Beginning WordPress 3
Beginning WordPress 3

One of the most popular open source blogging and content management systems, WordPress lets you create a website to promote yourself or your business quickly and easilyâ?"and better yet, it's free. WordPress is a flexible, user-friendly system, and it can be extended with a variety of themes and plugins.

...

Oracle RMAN 11g Backup and Recovery (Osborne ORACLE Press Series)
Oracle RMAN 11g Backup and Recovery (Osborne ORACLE Press Series)

Master Oracle Recovery Master

Protect your databases from hardware, software, and operator failures using the detailed information in this Oracle Press guide. Oracle RMAN 11g Backup and Recovery explains how to configure databases, generate accurate archives, and carry out system restores. Work from the command line or...

WCF Multi-tier Services Development with LINQ
WCF Multi-tier Services Development with LINQ

WCF is Microsoft's unified programming model for building service-oriented applications. It enables developers to build secure, reliable, transacted solutions that integrate across platforms and interoperate with existing investments. WCF is built on the Microsoft .NET Framework and simplifies development of connected systems. It unifies...

The Manga Guide to Databases (Manga Guide To...)
The Manga Guide to Databases (Manga Guide To...)

Want to learn about databases without the tedium? With its unique combination of Japanese-style comics and serious educational content, The Manga Guide to Databases is just the book for you.

Princess Ruruna is stressed out. With the king and queen away, she has to manage the Kingdom of Kod's humongous...

Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

How to Do Everything Palm Pre
How to Do Everything Palm Pre

Maximize the power of your Palm Pre!

This easy-to-follow guide shows you how to get the most out of the innovative smartphone built on the Palm webOS platform. How to Do Everything: Palm Pre helps you navigate the interface, load data from various sources, and use all the communication features--phone, email, and...

SQL For Dummies
SQL For Dummies

Learn SQL the fun and easy way – no programming experience needed!

SQL For Dummies, 7th Edition, shows programmers and web developers how to use SQL to build relational databases and get valuable information from them. This book covers the core features of the SQL language. Topics covered include how to use SQL to...

SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will...

Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy