Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Multiagent System Technologies: Second German Conference, MATES 2004, Erfurt, Germany, September 29-30, 2004, Proceedings
Multiagent System Technologies: Second German Conference, MATES 2004, Erfurt, Germany, September 29-30, 2004, Proceedings
This book constitutes the refereed proceedings of the Second German Conference on Multiagent Systems Technologies, MATES 2004, held in Erfurt, Germany, in September 2004.

The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on...

VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management

An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational...

Securing Biometrics Applications
Securing Biometrics Applications
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm,...
The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
MCTS Self-Paced Training Kit (Exam 70-503): Microsoft® .NET Framework 3.5 Windows® Communication Foundation (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-503): Microsoft® .NET Framework 3.5 Windows® Communication Foundation (PRO-Certification)
Your 2-in-1 Self-Paced Training Kit EXAM PREP GUIDE Ace your preparation for the skills measured by MCTS Exam 70-503 and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply what you ve learned through real-world case scenarios and practice exercises. This official...
Programming Grails
Programming Grails

Dig deeper into Grails architecture and discover how this application framework works its magic. Written by a core developer on the Grails team, this practical guide takes you behind the curtain to reveal the inner workings of its 2.0 feature set. You’ll learn best practices for building and deploying Grails applications,...

unlimited object storage image
Result Page: 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy