Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Windows Forensics: The Field Guide for Corporate Computer Investigations
Windows Forensics: The Field Guide for Corporate Computer Investigations

The evidence is in--to solve Windows crime, you need Windows tools

An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime.

Whether...

The Complete FreeBSD, Fourth Edition
The Complete FreeBSD, Fourth Edition

FreeBSD is by far the most popular version of BSDВ®, the legendary operating system that has contributed a great deal to every version of UnixВ® in use today (including Mac OSВ® X). Originally a community effort by the University of California at Berkeley, FreeBSD was aimed at making Unix a little friendlier and easier to...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

Scaling Oracle8i(TM): Building Highly Scalable OLTP System Architectures
Scaling Oracle8i(TM): Building Highly Scalable OLTP System Architectures
This is a book about getting the most out of Oracle8i on UNIX systems. While many people understand how to administrate Oracle and UNIX, far fewer understand the issues and workings of the software and hardware, thus limiting the scalability of the system. This book aims to open up this essential information, enabling the reader to build faster,...
flex & bison
flex & bison
If you need to parse or process text data in Linux or Unix, this useful book explains how to use flex and bison to solve your problems quickly. flex & bison is the long-awaited sequel to the classic O'Reilly book, lex & yacc. In the nearly two decades since the original book was published, the flex and bison utilities have proven...
The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Mac OS X Pocket Reference: A User's Guide to Mac OS X
Mac OS X Pocket Reference: A User's Guide to Mac OS X

Apple's new operating system, Mac OS X, is reaching a critical mass. Its sleek Aqua interface, combined with a powerful BSD Unix core, bring usability and stability to a new level. As companies start to migrate to Mac OS X from earlier versions of the Mac OS and from other flavors of Unix, IT managers are looking for a quick...

Maximum Mac OS X Security
Maximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally...

Expert Oracle GoldenGate
Expert Oracle GoldenGate

Oracle Corporation acquired GoldenGate in 2009 as part of future strategy to implement advanced replication technologies within the product suite of data warehousing and real-time transaction management. Before the advent of Oracle GoldenGate technology, data replication was performed using Oracle Streams and third-party replication...

MCSE: The Core Exams in a Nutshell (In a Nutshell (O'Reilly))
MCSE: The Core Exams in a Nutshell (In a Nutshell (O'Reilly))

Microsoft's MCSE (Microsoft Certified Systems Engineer) program is a rigorous testing and certification program for Windows NT system and network administrators. To achieve certification, one must pass four required exams and two elective exams. Close to twenty potential elective exams exist, although only nine of them are...

An Introduction to R
An Introduction to R

This tutorial manual provides a comprehensive introduction to R, a software package for statistical computing and graphics. R supports a wide range of statistical techniques and is easily extensible via user-defined functions. One of R's strengths is the ease with which publication-quality plots can be produced in a wide variety of...

unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy