Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django

Design, build and test RESTful web services with the Django framework and Python

Key Features

  • Create efficient real-world RESTful web services with the latest Django framework
  • Authenticate, secure, and integrate third-party packages efficiently in your Web Services
  • ...
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

The Definitive Guide to SUSE Linux Enterprise Server 12
The Definitive Guide to SUSE Linux Enterprise Server 12

The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments....

Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition

Build customized solutions that fulfil your business requirements using the latest features of Jira 8

Key Features

  • Learn how to customize Jira applications to suit your organizational requirements
  • Extend Jira's capabilities for custom integrations with other products...
Venture Capital Funding: A Practical Guide to Raising Finance
Venture Capital Funding: A Practical Guide to Raising Finance
After the problems caused by the dot com boom, there is now renewed interest in venture capital: private equity funds are reporting significantly increased levels of activity both in the UK and worldwide. The Bank of England regards assisting firms to become "investment ready" as the single most important task facing financial...
Mastering Windows Server 2003
Mastering Windows Server 2003
The Only Windows Server Resource You Need

The single most comprehensive and understandable book on the subject, Mastering Windows Server 2003 continues author Mark Minasi's award-winning tradition of clear and comprehensive coverage of Microsoft's Windows Server products. This book shows you how to plan, configure and install
...
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Oracle Distributed Systems
Oracle Distributed Systems
Any organization that uses the Oracle relational database management system (RDBMS) these days needs to use multiple databases. There are many reasons to use more than a single database in a distributed database system:
  • Different databases may be associated with particular business functions, such as manufacturing or...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy