Home | Amazing | Today | Tags | Publishers | Years | Search 
How to Cheat at Managing Windows Small Business Server
How to Cheat at Managing Windows Small Business Server
You’re holding this book in your hands at the local bookstore, or maybe
viewing it online. Better yet, you’re sitting at your desk with a cup of coffee
looking at this foreword.You’re wondering if you bought the right book.

You’re probably expecting to find some serious shortcuts to managing...
Black Hat Physical Device Security: Exploiting Hardware and Software
Black Hat Physical Device Security: Exploiting Hardware and Software
Attacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,...
Ethereal Packet Sniffing
Ethereal Packet Sniffing

Ethereal offers more protocol decoding and reassembly than any free sniffer out there and ranks well among the commercial tools. You’ve all used tools like tcpdump or windump to examine individual packets, but Ethereal makes it easier to make sense of a stream of ongoing network communications. Ethereal not only makes network...

Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an...

Inside the Spam Cartel
Inside the Spam Cartel

Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and...

Check Point NG/AI: Next Generation with Application Intelligence Security Administration
Check Point NG/AI: Next Generation with Application Intelligence Security Administration

In Check Point Next Generation with Application Security Administration you will cover the basic concepts of security and how to configure a simple firewall all the way to some very advanced VPN scenarios. This book is written by experts in the field as well as certified instructors to give the depth desired by the most advanced users,...

Managing and Securing a Cisco SWAN
Managing and Securing a Cisco SWAN
Wireless networking is all about freedom. Freedom is a worthy goal in its own right, and freedom in an organizational context pays dividends.

It’s tremendously cool to be able to sit down in an office or conference room, open your portable computer, and have instant connectivity to the resources you need to do your job.With
...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Software Piracy Exposed
Software Piracy Exposed
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software...
The Best Travel Writing 2010: True Stories from Around the World
The Best Travel Writing 2010: True Stories from Around the World
My favorite mountaineering book is The Mountains of My Life, by legendary Italian climber Walter Bonatti. While I love being in the mountains—it’s a rare day I don’t daydream about the Alps or the Himalayas—I am not a climber. It isn’t so much Bonatti’s exploits that inspire me as his attitude towards...
SQR in PeopleSoft and Other Applications Second Edition: PeopleSoft v.8
SQR in PeopleSoft and Other Applications Second Edition: PeopleSoft v.8
SQR in PeopleSoft and Other Applications fills a big gap in the enterprise computing marketplace. For starters, this book explains (beginning from near zero) how to program with Structured Query Report Writer (SQR). It discusses the peculiarities of writing SQR software to interact with PeopleSoft databases. Readers are shown how to...
XDoclet in Action (In Action series)
XDoclet in Action (In Action series)
A guide to the new XDoclet development tool that eliminates programming busy work by automatically generating code and other deployment artifacts, this book enables developers who place metadata in a single source code file to use XDoclet to generate additional source code and other files that are required in a project. Both smaller code...
Result Page: Previous 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy