Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Hosting For Dummies
Web Hosting For Dummies

Host your own website or blog with this unique guide

If you'd like to make the leap from a hosted environment to a self-hosted service, this book is for you. You may be making the move from casual blogging to professional blogging. Or, you might already be self-hosting, but want a good guide to show you how to get more...

SharePoint 2010 Business Intelligence 24-Hour Trainer (Wrox Programmer to Programmer)
SharePoint 2010 Business Intelligence 24-Hour Trainer (Wrox Programmer to Programmer)

IF YOU’VE PICKED UP THIS BOOK, SharePoint 2010 Business Intelligence 24-Hour Trainer, you’ve decided to jump into one of the most dynamic areas of Business Intelligence: the exciting visualizations,

collaboration, and data service capabilities built into SharePoint 2010 through its new service application
...
SQL Server Security Distilled, Second Edition
SQL Server Security Distilled, Second Edition

SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern for all businesses. Securing SQL Server is one of the most important responsibilities of the SQL Server professional.

SQL Server Distilled, Second Edition is a very carefully researched, clearly explained book...

Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Managing and Securing a Cisco SWAN
Managing and Securing a Cisco SWAN
Wireless networking is all about freedom. Freedom is a worthy goal in its own right, and freedom in an organizational context pays dividends.

It’s tremendously cool to be able to sit down in an office or conference room, open your portable computer, and have instant connectivity to the resources you need to do your job.With
...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Public Interest Rules of International Law (The Ashgate International Law Series)
Public Interest Rules of International Law (The Ashgate International Law Series)

This book seeks to clarify factors that play an important role in securing the effectiveness of legal regimes that aim at protecting public interests of the international community. In Part 1, the authors focus on theoretical problems arising in the implementation process of those legal regimes from both a constitutional and functional...

Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7
Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7

Microsoft Windows 7 Administrator's Reference gives you a complete overview of all the important day-to-day duties for which administrators are responsible. From a complete overview of upgrading and implementing to a detailed view of security in Windows 7, this book will keep you on track. Coverage includes: installing and...

iOS Components and Frameworks: Understanding the Advanced Features of the iOS SDK (Developer's Library)
iOS Components and Frameworks: Understanding the Advanced Features of the iOS SDK (Developer's Library)

Take Your Next Leap Forward as an iOS App Developer! Covers iOS 7 and Xcode 5

 

iOS Components and Frameworks will help you leverage iOS’s powerful components and frameworks to build apps with outstanding performance, reliability,...

Hudson 3 Essentials
Hudson 3 Essentials

Here is a book that makes life easier for Java developers or administrators by teaching you how to automate application testing using Hudson 3. Fast-paced and hands-on, the guide covers everything from installation to writing plugins.

Overview

  • A practical guide that will teach you how to deploy Hudson 3...
Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy