Télécharger le livre :  Perfect Passwords
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every...

Editeur : Syngress
Parution : 2006-01-09
PDF sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Writing Security Tools and Exploits
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit,...

Editeur : Syngress
Parution : 2006-01-05
PDF sans DRM

32,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Designing Security for a Windows Server 2003 Network
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Editeur : Syngress
Parution : 2005-12-15
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book...

Editeur : Syngress
Parution : 2005-12-15
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Skype Me! From Single User to Small Enterprise and Beyond
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin...

Editeur : Syngress
Parution : 2005-12-12
epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Windows Server Update Services
Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing IM and P2P Applications for the Enterprise
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Phishing Exposed
Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The...

Editeur : Syngress
Parution : 2005-11-21
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Security
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...

Editeur : Wiley-Interscience
Parution : 2005-11-11
PDF

94,90

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring Check Point NGX VPN-1/Firewall-1
Check Point NGX VPN-1/Firewall-1 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection &...

Editeur : Syngress
Parution : 2005-11-01
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at IT Project Management
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it...

Editeur : Syngress
Parution : 2005-10-21
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Understanding Mobile Human-Computer Interaction
Taking a psychological perspective, this book examines the role of Human-Computer Interaction in the field of Information Systems research. The introductory section of the book covers the basic tenets of the HCI discipline, including how it developed and an overview of...

Editeur : Butterworth-Heinemann
Parution : 2005-09-09
PDF sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring VMware ESX Server 2.5
This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding...

Editeur : Syngress
Parution : 2005-08-31
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Evaluation Using the NSA IEM
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the...

Editeur : Syngress
Parution : 2005-08-26
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Stealing the Network: How to Own an Identity
The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In...

Editeur : Syngress
Parution : 2005-08-24
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Host Integrity Monitoring Using Osiris and Samhain
This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover...

Editeur : Syngress
Parution : 2005-07-25
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer-Graphic Facial Reconstruction
This unique books looks at a cost-efficient, fast and accurate means of facial reconstruction--from segmented, decomposed, or skeletal remains--using computer-graphic and computational means.Computer-Graphic Facial Reconstruction is designed as a valuable resource for...

Editeur : Academic Press
Parution : 2005-07-02
PDF sans DRM

111,83

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cisco PIX Firewalls
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX...

Editeur : Syngress
Parution : 2005-06-21
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by...

Editeur : Syngress
Parution : 2005-06-02
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery...

Editeur : Syngress
Parution : 2005-05-24
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
<< < 2930313233 >