Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Heroku Postgres
Learning Heroku Postgres

Efficiently design, implement, and manage a successful PostgreSQL database with Heroku

About This Book

  • Manage and optimize your PostgreSQL database with Heroku Postgres
  • Secure your database with rollback, followers and forks functionalities
  • A step-by-step tutorial with...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition

Create a fault-tolerant backend for your real-time applications using Docker, Node.js 10, and MongoDB, and implement HTTPS for hardened security

Key Features

  • Learn server-side programming with JavaScript and Node.js 10
  • Explore the latest JavaScript features and ECMAScript...
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect yourself from these information predators by securing your...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
Mastering Microsoft Windows Vista Home: Premium and Basic
Mastering Microsoft Windows Vista Home: Premium and Basic
In-depth Coverage of Windows Vista Home Premium—Including Coverage of Vista Home Basic

Configure, run, and troubleshoot Windows Vista Home Premium or Windows Vista Home Basic with the detailed coverage you'll find in this comprehensive guide. With a task-based approach and clear, no-nonsense instructions,...

Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Securing SQL Server, Second Edition: Protecting Your Database from Attackers
Securing SQL Server, Second Edition: Protecting Your Database from Attackers

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names...

Core Web Application Development with PHP and MySQL
Core Web Application Development with PHP and MySQL

The programmers guide to building robust web applications with PHP and MySQL

This is a comprehensive, practical guide for programmers who want to develop production-quality, database-enabled web applications with PHP and MySQL. Long-time developer Marc Wandschneider...

Nokia Network Security Solutions Handbook
Nokia Network Security Solutions Handbook
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are discussed in detail, as well as...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy