Account
Orders
Advanced search
This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator.This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is...
Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...
iPhone and iOS Forensics is a guide to the forensic acquisition and analysis ofiPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an...
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is...
Android Forensics: Investigation, Analysis, and Mobile Security for GoogleAndroid provides the background, techniques and analysis tools you need to effectively investigate anAndroid phone. This book offers a thorough review of theAndroid platform, including the core...
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a...
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and...
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The...
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The...
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the...
The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a...
The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show how sound, sight,...
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go...
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for theMetasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing....
This exam is designed to validate Windows Server 2008 Active Directory skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is...
Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques...
This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers