Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online
Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online

It’s a well-known fact that scouring through the online world not just conveys accommodation to the world all in all, however there are numerous things that you can do online today that you couldn't do a few years prior. Not just would you be able to now shop online for all intents and purposes anything that you require, yet you can...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Windows 8.1 All-in-One For Dummies
Windows 8.1 All-in-One For Dummies

Ten minibooks in one get you thoroughly caught up on Windows 8.1!

With new improvements and changes, Windows 8.1 offers a refreshed user interface, better integration between the new and traditional Windows interfaces, and more. This updated top-selling guide is what you need to get up to speed on everything Windows 8.1....

Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

Learning Spring Application Development
Learning Spring Application Development

Develop dynamic, feature-rich, and robust Spring-based applications using the Spring Framework

About This Book

  • Build and deploy Spring-powered, production-grade applications and services with minimal fuss
  • Discover the key Spring framework-related technology standards such as Spring core,...
Pro SQL Database for Windows Azure: SQL Server in the Cloud
Pro SQL Database for Windows Azure: SQL Server in the Cloud

Pro SQL Database for Windows Azure, 2nd Edition shows how to create enterprise-level database deployments without the usual investment in datacenter and other infrastructure. Take advantage instead of Microsoft’s worldwide backbone for cloud computing that delivers all the power of SQL Server in the form of the cloud-based...

Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server is becoming a more mature, more feature-rich, and more secure database management system with each new version. SQL Server 2012 is an enterprise-class relational database server. Sometimes, it might not look like it to the staff whose responsibilities are to deploy it, to create databases and write T-SQL code, and to...
Getting Started with Kubernetes - Second Edition
Getting Started with Kubernetes - Second Edition

Learn how to schedule and run application containers using Kubernetes.

About This Book

  • Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
  • Confidently manage your container clusters and networks using Kubernetes
  • This practical...
PostgreSQL Administration Cookbook, 9.5/9.6 Edition
PostgreSQL Administration Cookbook, 9.5/9.6 Edition

Over 150 recipes to help you administer your PostgreSQL database more efficiently

About This Book

  • Get to grips with the capabilities of PostgreSQL 9.6 to administer your database more efficiently
  • Monitor, tune, secure and protect your database
  • A step-by-step, recipe-based...
Result Page: 38 37 36 35 34 33 32 31 30 29 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy