Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing Your Personal Finances with Quicken : Visual QuickProject Guide
Managing Your Personal Finances with Quicken : Visual QuickProject Guide

The Visual QuickProject Guide that you hold in your hands offers a unique way to learn about new technologies. Instead of drowning you in theoretical possibilities and lengthy explanations, this Visual QuickProject Guide uses big, color illustrations coupled...

Designing Network Security (2nd Edition) (Networking Technology)
Designing Network Security (2nd Edition) (Networking Technology)
Master the design of secure networks with the updated edition of this best-selling security guide

* Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
* Learn how to use new and legacy Cisco Systems equipment to secure your networks
* Understand how
...

Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies
Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies
9 books in 1– one great price for nine handy, quick reference guides!

Your one-stop guide to the latest release of this popular Linux distribution

Get ready to tip your hat to the latest version of Fedora! From installing Fedora on your PC and using OpenOffice.org to securing your system and setting up servers, the nine...

Distributed Source Coding
Distributed Source Coding

Everything a signal and image processing engineer needs to know about distributed source coding - theorems, practical algorithms for design and the latest applications.

The advent of wireless sensor technology and ad-hoc networks has made DSC a major field of interest. Edited and written by the leading players in the field,
...

Joomla! Web Security
Joomla! Web Security
In Detail

Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,...

Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of...
Defending the Digital Frontier: A Security Agenda
Defending the Digital Frontier: A Security Agenda

Praise for Defending the Digital Frontier

"The charge of securing corporate America falls upon its business leaders. This book, offered by Ernst & Young and written by Mark Doll, Sajay Rai, and Jose Granado, is not only timely, but comprehensive in outlook and broad in scope. It addresses many of the critical security...

Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts....

Oracle Advanced PL/SQL Developer Professional Guide
Oracle Advanced PL/SQL Developer Professional Guide

PL/SQL (Procedural Language/Structured Query Language) is Oracle Corporation's procedural extension

language for SQL and the Oracle relational database. Server-side PL/SQL is stored and compiled in the Oracle Database and runs within the Oracle executable. With this guide Oracle developers can work towards...
Expert SQL Server 2008 Development
Expert SQL Server 2008 Development

Expert SQL Server 2008 Development is aimed at SQL Server developers ready to move beyond Books Online. Author and experienced developer Alastair Aitchison shows you how to think about SQL Server development as if it were any other type of development. You’ll learn to manage testing in SQL Server and to properly...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy