Account
Orders
Advanced search
This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover...
Learn to pull "digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book...
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date...
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the...
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them,...
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration...
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are...
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP...
Fuzzing is often described as a "black box software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are...
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools.This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done....
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise...
This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from...
This exam is designed to validate proficieny supporting Windows Vista client.This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for...
Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques...
Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deployMicrosoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely...
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book...
The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show how sound, sight,...
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an...
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus...
The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers