45 livres(s)
Télécharger le livre :  Secure Your Network for Free
Ajouter à ma liste d'envies

Secure Your Network for Free


Eric Seagren


This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools.This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done....

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  How to Cheat at Configuring Exchange Server 2007
Ajouter à ma liste d'envies

How to Cheat at Configuring Exchange Server 2007


Henrik Walther


The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Building Robots with LEGO Mindstorms NXT
Ajouter à ma liste d'envies

Building Robots with LEGO Mindstorms NXT


Guilio Ferrari , Mario Ferrari


The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show how sound, sight,...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Linksys WRT54G Ultimate Hacking
Ajouter à ma liste d'envies

Linksys WRT54G Ultimate Hacking


Paul Asadoorian , Larry Pesce


This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Brave NUI World
Ajouter à ma liste d'envies

Brave NUI World


Daniel Wigdor , Dennis Wixon


Brave NUI World is the first practical guide for designing touch- and gesture-based user interfaces. Written by the team from Microsoft that developed the multi-touch, multi-user Surface® tabletop product, it introduces the reader to natural user interfaces (NUI). It...

Parution : 2011-04-05
Format(s) : epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
34,76
Télécharger le livre :  Practical Lock Picking
Ajouter à ma liste d'envies

Practical Lock Picking


Deviant Ollam


Practical Lock Picking: A Physical Penetration Tester's Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open...

Parution : 2010-09-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
32,65
Télécharger le livre :  Microsoft Windows Server 2008 R2 Administrator's Reference
Ajouter à ma liste d'envies

Microsoft Windows Server 2008 R2 Administrator's Reference


Dustin Hannifin


Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions;...

Parution : 2010-08-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
36,87
Télécharger le livre :  Computer Forensics For Dummies
Ajouter à ma liste d'envies

Computer Forensics For Dummies


Reynaldo Anzaldua , Carol Pollard


Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the...

Parution : 2008-10-10
Format(s) : PDF, ePub
Éditeur : For Dummies
J'achète
35,86
Télécharger le livre :  The Oracle Hacker's Handbook
Ajouter à ma liste d'envies

The Oracle Hacker's Handbook


David Litchfield


David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique...

Parution : 2007-03-31
Format(s) : PDF
Éditeur : Wiley
J'achète
43,15
Télécharger le livre :  How to Cheat at Securing a Wireless Network
Ajouter à ma liste d'envies

How to Cheat at Securing a Wireless Network


Lee Barken , Chris Hurley


Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing...

Parution : 2006-08-22
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  How to Cheat at Managing Microsoft Operations Manager 2005
Ajouter à ma liste d'envies

How to Cheat at Managing Microsoft Operations Manager 2005


Anthony Piltzecker


Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever...

Parution : 2006-03-01
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Ajouter à ma liste d'envies

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure


Brian Barber , Michael Cross , Hal Kurz , Melissa M. Meyer


Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Parution : 2006-02-08
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Writing Security Tools and Exploits
Ajouter à ma liste d'envies

Writing Security Tools and Exploits


James C Foster


Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit,...

Parution : 2006-01-05
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
32,69
Télécharger le livre :  How to Cheat at Designing Security for a Windows Server 2003 Network
Ajouter à ma liste d'envies

How to Cheat at Designing Security for a Windows Server 2003 Network


Chris Peiris , Chris Ruston


Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Parution : 2005-12-15
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  How to Cheat at Managing Windows Server Update Services
Ajouter à ma liste d'envies

How to Cheat at Managing Windows Server Update Services


B. Barber


Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the...

Parution : 2005-12-12
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Stealing the Network: How to Own an Identity
Ajouter à ma liste d'envies

Stealing the Network: How to Own an Identity


Collectif


The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In...

Parution : 2005-08-24
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
Ajouter à ma liste d'envies

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul


Aaron W Bayles , Ed Brindley , Chris Hurley , Johnny Long


"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by...

Parution : 2005-06-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Ajouter à ma liste d'envies

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives


Eric Cole , Michael Nordfelt , Sandra Ring , Ted Fair


Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...

Parution : 2005-03-15
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Apple I Replica Creation
Ajouter à ma liste d'envies

Apple I Replica Creation


Tom Owad


The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design.The...

Parution : 2005-02-17
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Malicious Cryptography
Ajouter à ma liste d'envies

Malicious Cryptography


Adam Young , Moti Yung


Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...

Parution : 2004-07-30
Format(s) : PDF
Éditeur : Wiley
J'achète
43,25
<< < 123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés