Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Learning Microsoft Windows Server 2012 Dynamic Access Control
Learning Microsoft Windows Server 2012 Dynamic Access Control

When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.

Overview

  • Understand the advantages of using Dynamic Access Control and how it...
UNIX(R) System Security: A Guide for Users and System Administrators
UNIX(R) System Security: A Guide for Users and System Administrators

Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.

...
Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

J2EE Platform Web Services
J2EE Platform Web Services

Build robust, scalable, end-to-end business solutions with J2EE(TM) Web Services.

This is the definitive practitioner's guide to building enterprise-class J2EE Web Services that integrate with any B2B application and interoperate with any legacy system. Sun senior architect Ray Lai introduces 25...

Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
In just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.

Welcome to Sams Teach Yourself Microsoft Office
...
Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services
Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services
Service-oriented integration with less cost and less risk

  

The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA...

Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Sams Teach Yourself Windows XP Computer Basics All in One
Sams Teach Yourself Windows XP Computer Basics All in One

Have you ever wished you had just one book, a truly complete reference that tells you what you need to know about your new or upgraded computer? Have you wanted one that's written in plain talk, one that tells you what you need to know to get started, and one that takes you to the next level without being too techie? Have you...

Hardcore Windows XP
Hardcore Windows XP

A Must-Have Resource for Power Users!

Take control of Windows XP and get the most out of everything this powerful operating system has to offer. Written by Microsoft Windows XP Expert Zone columnist Joli Ballew, this book shows you hundreds of tips and tricks you’ll be able to use right away. Learn to do everything from kick...

unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy