Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance
The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance
SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005, because it brings increased ability to deliver data across more platforms, and thus many different types of devices. New functionality also...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Before you start your hacking projects, you'll need the right arsenal of tools. For some hacks, you might need only a single screwdriver. For others, you could need a workshop complete with power tools and advanced electronic equipment. For the most part, it isn't necessary to have a world-class laboratory or top-of-the-line computer system to...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

.NET Mobile Web Developer's Guide
.NET Mobile Web Developer's Guide
The .NET Mobile Web Developer's Guide provides a solid foundation for developing mobile applications using Microsoft technologies. With a focus on using ASP.NET and the .NET Mobile Internet Toolkit, .NET Mobile Web Developer's Guide will give you the insight to use Microsoft technologies for developing mobile applications. This book will also show...
Virtualization with Microsoft Virtual Server 2005
Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...
How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy