Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
Integrating ISA Server 2006 with Microsoft Exchange 2007
Integrating ISA Server 2006 with Microsoft Exchange 2007
Everything IT pros need to know about using ISA Server 2006 to defend their companies' email and remote users from hack attacks!

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time
...
SSCP Study Guide and DVD Training System
SSCP Study Guide and DVD Training System

The SSCP Study Guide is a one-of-a-kind text and Web-based stimulation and remediation. The system gives you 100% coverage of the official International Information Systems Security Certification Consortium, Inc. (ISC)

  • Completely Guaranteed Coverage of All Exam Objectives: All seven SSCP domains are covered in full;...
Virtualization with VMware ESX Server
Virtualization with VMware ESX Server

A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. VMware's ESX server is the enterprise tool that provides the platform on which a complete virtual infrastructure can be designed,...

Windows 2000 Active Directory
Windows 2000 Active Directory
Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. If you are a...
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting
Security of corporate networks has become big business. Many companies are willing
to provide hardware, software, consulting, design, and implementation services.The
product space is vast, offering many different levels of products that claim to provide
all manner of solutions.The problem with the current state of the security space
...
The Best Damn Cisco Internetworking Book Period
The Best Damn Cisco Internetworking Book Period
Cisco is almost synonymous with networking.There is almost no area of networking in which
Cisco is not a key player, or is not making inroads.You name it Cisco makes it—routers, switches,
firewalls, management software, and so on. It can be quite an undertaking to locate and acquire
all of the information needed to configure,
...
Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy