Home | Amazing | Today | Tags | Publishers | Years | Search 
How to Cheat at Administering Office Communications Server 2007
How to Cheat at Administering Office Communications Server 2007
Microsoft Office Communications Server (OCS) 2007 is Microsofts latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP (VoIP), and audio conferencing and videoconferencing. It will work with your companys...
Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals,...
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...
Result Page: Previous 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy