Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

MCSE Exam 70-294 Study Guide and DVD Training System: Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
MCSE Exam 70-294 Study Guide and DVD Training System: Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
All of Microsoft’s published objectives for the MCSE 70-
294 Exam are covered in this book. To help you easily
find the sections that directly support particular
objectives, we’ve listed all of the exam objectives
below, and mapped them to the Chapter number in
which they are covered. We’ve also assigned
...
How to Cheat at IT Project Management
How to Cheat at IT Project Management
Unlike any other book you'll find, this IT project management book synthesizes project management fundamentals, IT processes and procedures, and business fundamentals. Learn how to align your IT projects to the company's strategic objectives. Also learn how to determine which project will solve the right problem at the right time while still...
How to Cheat at Managing Microsoft Operations Manager 2005
How to Cheat at Managing Microsoft Operations Manager 2005
How to Cheat at Managing Microsoft Operations Manager 2005 is written for
system administrators and systems engineers who are responsible for the upkeep
and administration of IT environments, from a two server environment to a
large enterprise.This book will is a must-read for anyone looking at implementing
an enterprise
...
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
How to Cheat at Managing Windows Server Update Services
How to Cheat at Managing Windows Server Update Services
Automate Patch Management Across Your Network If you manage a Microsoft Windows network, you probably find yourself overwhelmed at times by the sheer volume of updates and patches released by Microsoft for its products. You know these updates are critical to keep your network running efficiently and securely, but staying current...
MCSA/MCSE Exam 70-292 Study Guide and DVD Training System: Managing and Maintaining a Windows Server 2003 Environment
MCSA/MCSE Exam 70-292 Study Guide and DVD Training System: Managing and Maintaining a Windows Server 2003 Environment
All of Microsoft’s published objectives for the MCSA/MCSE
70-292 Exam are covered in this book. To help you
easily find the sections that directly support particular
objectives, we’ve listed all of the exam objectives
below, and mapped them to the Chapter
number in which they are covered. We’ve also...
Designing SQL Server 2000 Databases for .Net Enter
Designing SQL Server 2000 Databases for .Net Enter
As a consultant, the process of designing and developing technology-based solutions is
one that you get to know intimately, thanks to iteration. Having been involved in a dozen
or more projects in the past few years, I came to realize that a common component exists
at the center of every one of those solutions. That component is the
...
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Virtualization with VMware ESX Server
Virtualization with VMware ESX Server

A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. VMware's ESX server is the enterprise tool that provides the platform on which a complete virtual infrastructure can be designed,...

Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy