|
|
|
|
|
|
Pro SMS 2003Systems Management Server (SMS) 2003 is the fifth revision of Microsoft’s product. Since it first appeared, its function and form have undergone vast changes. The 1.2 version made a big impact in the industry. It became a somewhat usable and stable, though temperamental, product. Some enterprises that invested their time and effort in this... | | Introduction to Tornado
Walk through the basics of Tornado, the high-performance web server known for its speed, simplicity, and scalability on projects large and small. With this hands-on guide, you’ll learn how to use Tornado’s acclaimed features by working with several example applications. You also get best practices for using Tornado in the... | | Practical Internet SecurityAs organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external... |
|
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by... | | Hacking VoIP: Protocols, Attacks, and CountermeasuresVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,... | | Web Security Field GuideWhile the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient... |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |