Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing and Building Enterprise DMZs
Designing and Building Enterprise DMZs
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.

One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a
...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration
This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.

This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting APIs and how they can be leveraged to
...
Windows Forensic Analysis DVD Toolkit
Windows Forensic Analysis DVD Toolkit
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and...
10 Cool LEGO Mindstorms Ultimate Builder Projects: Amazing Projects You Can Build in Under an Hour
10 Cool LEGO Mindstorms Ultimate Builder Projects: Amazing Projects You Can Build in Under an Hour
LEGO MINDSTORMS lets you design and program robots that can do just about anything!
You've just purchased the LEGO MINDSTORMS Ultimate Builder Kit. Now what? Overwhelmed by the creative possibilities? The Builder Kit is targeted towards those who want to become "master LEGO builders."

10 Cool LEGO MINDSTORM Ultimate
...
Consumer's Guide to Cell Phones & Wireless Service
Consumer's Guide to Cell Phones & Wireless Service
Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executive Experts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming...
RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders).

This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly
...
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the
...
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
ASP.net Web Developer's Guide (With CD-ROM)
ASP.net Web Developer's Guide (With CD-ROM)
Aimed at the working ASP developer who wants to move to Microsoft .NET, ASP.NET Unleashed: Web Developers Guide offers an excellent example-based programming tutorial. With its strong practical focus, this title offers an excellent choice for learning ASP.NET quickly.

Most every computer book uses examples illustrating programming...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy