Anti-Hacker Tool Kit, Fourth Edition
Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...
COM and .NET Interoperability
COM and .NET Interoperability provides a complete overview on the process of building .NET applications which interact (interoperate) with existing COM code. Before digging into that critical topic, Andrew offers a concise overview of the COM architecture, and provides examples using various COM frameworks (C++, ATL, and VB 6.0)....
A hands-on guide to leveraging NoSQL databases
NoSQL databases are an efficient and powerful tool for storing and manipulating vast quantities of data. Most NoSQL databases scale well as data grows. In addition, they are often malleable and flexible enough to accommodate semi-structured and sparse data sets. This...
Group Policy: Fundamentals, Security, and the Managed Desktop
Get up to speed on the latest Group Policy tools, features, and best practices
Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10...
Penetration Testing with the Bash shell
Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools
About This Book
Utilize the command line to create, run, and execute tests
Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
|Result Page: 38 37 36 35 34 33 32 31 30 29 |