Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference
Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference

Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions; and discusses its deployment.
After introducing Windows Server 2008
...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Infosec Management Fundamentals
Infosec Management Fundamentals

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the...

Next Generation Red Teaming
Next Generation Red Teaming

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...

Securing Social Media in the Enterprise
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This...

Managing Information Security, Second Edition
Managing Information Security, Second Edition

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers...

Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

Introduction to Social Media Investigation: A Hands-on Approach
Introduction to Social Media Investigation: A Hands-on Approach

If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy