Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Network: Internet Tradecraft
Hack Proofing Your Network: Internet Tradecraft
This is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn...
Pro ASP.NET 4.5 in VB
Pro ASP.NET 4.5 in VB

ASP.NET 4.5 remains Microsoft's preferred technology for creating dynamic websites, providing developers with unrivaled power and flexibility.

Pro ASP.NET 4.5 in VB is the most complete reference to ASP.NET that you will find. This comprehensively revised fifth edition will teach you everything you need to know
...

CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification
from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this
certification is to provide professional-level recognition to network engineers in the design and
implementation of Cisco secure networks. This
...
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
Financial Freedom: A Guide to Achieving Lifelong Wealth and Security
Financial Freedom: A Guide to Achieving Lifelong Wealth and Security

If you're one of the millions of Americans who is buried in credit card debt, or maybe you're having trouble deciphering the fine print on your 401(K)—that is, if you even have a 401(K)!—don't dismay. You can start taking steps toward closing your financial illiteracy gap right away with the sound, practical personal...

Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...

Securing Citrix XenApp Server in the Enterprise
Securing Citrix XenApp Server in the Enterprise
Secure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features
...
Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS
Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS

A practical guide for developing end-to-end serverless microservices in Python for developers, DevOps, and architects.

Key Features

  • Create a secure, cost-effective, and scalable serverless data API
  • Use identity management and authentication for a user-specific and secure...
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Security+ Study Guide
Security+ Study Guide
Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides

The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test
...
PHPList 2 E-mail Campaign Manager
PHPList 2 E-mail Campaign Manager

Tired of an e-mail BCC list that scrolls off the page or fiddly and hard-to-manage bulk mailing systems? You need phpList—a high-powered, robust, feature-packed mailing system that will "get out of your way" and get the job done.

phpList 2 E-mail Campaign Manager will guide you from basic installation and setup...

Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition
Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition

Unleash the power of VMware vSphere 6.7 to develop a powerful, flexible, and secure digital infrastructure

Key Features

  • Explore management, security, scalability, and availability with vSphere 6.7
  • Design, deploy, and manage VMware vSphere virtual datacenters
  • ...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy