Account
Orders
Advanced search
Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is...
Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors' years of experience in working with attorneys as digital forensics experts, common questions arise again and...
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth...
TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately...
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and OtherIndustrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of...
This exam is designed to validate skills as a Windows Server 2008 Server Administrator.This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended...
Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies;...
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The...
This is the only practical, hands-on guide available to database administrators to secure their Oracle databases.This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable...
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately...
Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking...
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The...
Check Point NGX R65 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users.Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management...
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange...
This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator.This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is...
Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...
iPhone and iOS Forensics is a guide to the forensic acquisition and analysis ofiPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an...
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is...
Android Forensics: Investigation, Analysis, and Mobile Security for GoogleAndroid provides the background, techniques and analysis tools you need to effectively investigate anAndroid phone. This book offers a thorough review of theAndroid platform, including the core...
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers