Télécharger le livre :  How to Cheat at Administering Office Communications Server 2007
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Reverse Engineering Code with IDA Pro
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all useLinux as their standard operating system. This book teachesLinux system...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OS X Exploits and Defense
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Catastrophic Loss of Sensitive Data
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-642 Prep Kit
This exam is designed to validate Windows Server 2008 network infrastructure configuration skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-642.This is a test for new certification seekers, not for those who are...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-649 Prep Kit
This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-620 Prep Kit
This exam is designed to validate proficieny supporting Windows Vista client.This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Microsoft Windows Security Fundamentals
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of...

Editeur : Digital Press
Parution : 2011-04-08
PDF sans DRM

74,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Convergence
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing...

Editeur : Butterworth-Heinemann
Parution : 2011-04-08
PDF sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Brave NUI World
Brave NUI World is the first practical guide for designing touch- and gesture-based user interfaces. Written by the team from Microsoft that developed the multi-touch, multi-user Surface® tabletop product, it introduces the reader to natural user interfaces (NUI). It...

Editeur : Morgan Kaufmann
Parution : 2011-04-05
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Electronic Security Systems
Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses...

Editeur : Butterworth-Heinemann
Parution : 2011-04-01
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Integrated Security Systems Design
Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An integrated security...

Editeur : Butterworth-Heinemann
Parution : 2011-04-01
epub sans DRM

50,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a...

Editeur : Syngress
Parution : 2011-03-29
epub sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  BULLETPROOF WIRELESS SECURITY
Finally--a single volume guide to really effective security for both voice and data wireless networks! More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless...

Editeur : Newnes
Parution : 2011-03-15
PDF sans DRM

57,97

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  XBOX 360 Forensics
XBOX 360 Forensics is a complete investigation guide for theXBOX game console. Because theXBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evidence to...

Editeur : Syngress
Parution : 2011-02-07
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cryptography Engineering
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned...

Editeur : Wiley
Parution : 2011-02-02
PDF, ePub

51,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Web Application Obfuscation
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security...

Editeur : Syngress
Parution : 2011-01-13
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Implementing SSL / TLS Using Cryptography and PKI
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS),...

Editeur : Wiley
Parution : 2011-01-07
PDF, ePub

56,97

Téléchargement immédiat
Dès validation de votre commande
<< < 2324252627 >