Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing SQL Server 2000 Databases for .Net Enter
Designing SQL Server 2000 Databases for .Net Enter
As a consultant, the process of designing and developing technology-based solutions is
one that you get to know intimately, thanks to iteration. Having been involved in a dozen
or more projects in the past few years, I came to realize that a common component exists
at the center of every one of those solutions. That component is the
...
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition

Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice...

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Configuring Sonicwall Firewalls
Configuring Sonicwall Firewalls
Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s security.
The risks today have greatly increased, so the call for a stronger breed of firewall
has been made. In the past, simple packet-filtering firewalls allowing
...
Nokia Network Security Solutions Handbook
Nokia Network Security Solutions Handbook
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are discussed in detail, as well as...
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
The Perfect Reference for the Multitasked System Administrators
The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing
...
Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Sniffer Pro Network Optimization and Troubleshooting Handbook
Sniffer Pro Network Optimization and Troubleshooting Handbook
Imagine it is 4:00 P.M. and you are sitting at your desk with three books spread
across your lap.You are hard at work trying to figure out why performance on
your company’s file server has dropped sharply over the past eight hours. Of the
200 users in your company, nearly 100 of them have called to complain about
slow
...
How to Cheat at Windows System Administration Using Command Line Scripts
How to Cheat at Windows System Administration Using Command Line Scripts
If you want to streamline the administration of your Windows servers and workstations by using command line scripts, this is the book for you! With every new version of Windows, Microsoft attempts to ease administrative tasks by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy