Télécharger le livre :  Nagios 3 Enterprise Network Monitoring
The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you....

Editeur : Syngress
Parution : 2008-07-04
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security: Know It All
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best...

Editeur : Morgan Kaufmann
Parution : 2008-07-01
PDF sans DRM

74,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Netcat Power Tools
Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a...

Editeur : Syngress
Parution : 2008-06-13
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-648 Prep Kit
This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA...

Editeur : Syngress
Parution : 2008-06-03
PDF, epub sans DRM

46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OSSEC Host-Based Intrusion Detection Guide
This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal...

Editeur : Syngress
Parution : 2008-04-09
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Instant Messaging Reference
Virtual reference is a vital component in twenty-first century reference service and the time for debate over its virtues and necessity has passed. This book focuses on the practical implementation of instant messaging (IM), including privacy and security and its future...

Editeur : Chandos Publishing
Parution : 2008-01-31
PDF sans DRM

55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools...

Editeur : Syngress
Parution : 2007-11-16
PDF sans DRM

50,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT Security Interviews Exposed
Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job and a security crash course to prepare for the job interview Security is one of today's...

Editeur : Wiley
Parution : 2007-10-15
PDF

28,80

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Biorthogonal Systems in Banach Spaces
One of the fundamental questions of Banach space theory is whether every Banach space has a basis. A space with a basis gives us the feeling of familiarity and concreteness, and perhaps a chance to attempt the classification of all Banach spaces and other problems. The...

Editeur : Springer
Parution : 2007-10-04
Collection : CMS Books in Mathematics PDF

70,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style.Cryptology Unlocked explains encryption, crypto...

Editeur : Wiley
Parution : 2007-08-20
PDF

44,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Asterisk Hacking
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book...

Editeur : Syngress
Parution : 2007-08-13
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at IIS 7 Server Administration
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new...

Editeur : Syngress
Parution : 2007-06-22
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Applied Cryptanalysis
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA...

Editeur : Wiley-IEEE Press
Parution : 2007-06-15
Collection : IEEE Press PDF

133,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Snort Intrusion Detection and Prevention Toolkit
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend...

Editeur : Syngress
Parution : 2007-04-11
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Oracle Hacker's Handbook
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique...

Editeur : Wiley
Parution : 2007-03-31
PDF

43,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Security and Cryptography
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough...

Editeur : Wiley-Interscience
Parution : 2007-03-07
PDF

160,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Safety
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book...

Editeur : Wiley-VCH
Parution : 2007-02-27
PDF

116,00

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  FISMA Certification and Accreditation Handbook
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law.The different Certification and...

Editeur : Syngress
Parution : 2006-12-18
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Talking
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million...

Editeur : Syngress
Parution : 2006-12-13
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CD and DVD Forensics
CD and DVD Forensics will take the reader through all facets of handling, examining, and processingCD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate...

Editeur : Syngress
Parution : 2006-12-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
<< < 2728293031 >