Télécharger le livre :  Computer Viruses For Dummies
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...

Editeur : For Dummies
Parution : 2011-05-09
PDF, ePub

17,30

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  User Experience Management
User Experience Management: Essential Skills for Leading Effective UX Teams deals with specific issues associated with managing diverse user experience (UX) skills, often in corporations with a largely engineering culture. Part memoir and part handbook, it explains what...

Editeur : Morgan Kaufmann
Parution : 2011-05-09
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Web Commerce Security
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce...

Editeur : Wiley
Parution : 2011-05-04
PDF, ePub

54,12

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IP Address Management
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and...

Editeur : Wiley-IEEE Press
Parution : 2011-04-20
Collection : IEEE Press Series on Network and Service Management ePub

137,10

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Risk Management
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...

Editeur : Syngress
Parution : 2011-04-20
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a Digital Forensic Laboratory
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the...

Editeur : Syngress
Parution : 2011-04-19
epub sans DRM

66,41

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and...

Editeur : Syngress
Parution : 2011-04-18
PDF, epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools.This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done....

Editeur : Syngress
Parution : 2011-04-18
PDF, epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Securing SQL Server 2005
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at VoIP Security
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Microsoft Vista for IT Security Professionals
Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deployMicrosoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely...

Editeur : Syngress
Parution : 2011-04-18
PDF, epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Configuring VmWare ESX Server
A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress' proven...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Next Generation SSH2 Implementation
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  XSS Attacks
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Stealing the Network
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Open Source Fuzzing Tools
Fuzzing is often described as a "black box software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Crime Investigations
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter "What is Cyber Crime? This introductory chapter describes the most common challenges faced by...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn IT Security Management Book Period
The security field evolves rapidly becoming broader and more complex each year.The common thread tying the field together is the discipline of management.The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
<< < 2122232425 >