Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Home Server For Dummies (Computer/Tech)
Windows Home Server For Dummies (Computer/Tech)
If you work in an office, you probably don’t lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server...
Switching to the Mac: The Missing Manual, Lion Edition
Switching to the Mac: The Missing Manual, Lion Edition
What’s going on with the Mac these days?

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has quadrupled since 2005—it’s now around 20 percent of computer sales in the U.S. And then there’s the most
...
Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Geeks On Call Security and Privacy: 5-Minute Fixes
Geeks On Call Security and Privacy: 5-Minute Fixes
Bringing order to the lawless frontier

Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're...

CCSE NG: Check Point Certified Security Expert Study Guide
CCSE NG: Check Point Certified Security Expert Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Covers all Windows® XP service packs and Fedora Linux®

Your one-stop guide to building and managing a business or home network

Why take up a whole shelf with networking books when all the essentials are right here in one handy volume? Here's how to put a network together, choose the hardware and software, set up a server,...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy