Home | Amazing | Today | Tags | Publishers | Years | Search 
Next Generation SSH2 Implementation: Securing Data in Motion
Next Generation SSH2 Implementation: Securing Data in Motion
The most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book
...
Integrating ISA Server 2006 with Microsoft Exchange 2007
Integrating ISA Server 2006 with Microsoft Exchange 2007
Everything IT pros need to know about using ISA Server 2006 to defend their companies' email and remote users from hack attacks!

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time
...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs
Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs

This book is about building robots using Lego bricks and components. In the first section of the book (Part I) we will discuss why you might find an interest in robotics as a hobby, and why Lego is an ideal system to have a fast start and great results. If you're reading this book you probably own a Mindstorms set, so you already have an...

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Before you start your hacking projects, you'll need the right arsenal of tools. For some hacks, you might need only a single screwdriver. For others, you could need a workshop complete with power tools and advanced electronic equipment. For the most part, it isn't necessary to have a world-class laboratory or top-of-the-line computer system to...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
Learn to produce evidence-quality data for legal counsel accurately, efficiently and cost-effectively.

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI).
...
Securing Citrix XenApp Server in the Enterprise
Securing Citrix XenApp Server in the Enterprise
Secure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features
...
GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy