Télécharger le livre :  The Oracle Hacker's Handbook
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique...

Editeur : Wiley
Parution : 2007-03-31
PDF

43,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Security and Cryptography
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough...

Editeur : Wiley-Interscience
Parution : 2007-03-07
PDF

162,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Safety
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book...

Editeur : Wiley-VCH
Parution : 2007-02-27
PDF

117,65

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  FISMA Certification and Accreditation Handbook
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law.The different Certification and...

Editeur : Syngress
Parution : 2006-12-18
epub sans DRM

57,73

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Talking
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million...

Editeur : Syngress
Parution : 2006-12-13
PDF sans DRM

30,98

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CD and DVD Forensics
CD and DVD Forensics will take the reader through all facets of handling, examining, and processingCD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate...

Editeur : Syngress
Parution : 2006-12-12
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring Juniper Networks NetScreen and SSG Firewalls
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to...

Editeur : Syngress
Parution : 2006-12-08
epub sans DRM

41,68

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Syngress Force Emerging Threat Analysis
A One-Stop Reference Containing the Most Read Topics in the Syngress Security LibraryThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise...

Editeur : Syngress
Parution : 2006-11-08
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WarDriving and Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that...

Editeur : Syngress
Parution : 2006-11-08
epub sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Scripting VMware Power Tools: Automating Virtual Infrastructure Administration
This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail...

Editeur : Syngress
Parution : 2006-11-07
epub sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hack the Stack
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found...

Editeur : Syngress
Parution : 2006-11-06
epub sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Enemy at the Water Cooler
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and...

Editeur : Syngress
Parution : 2006-10-30
PDF sans DRM

43,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the...

Editeur : Syngress
Parution : 2006-10-13
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a VoIP Network with Nortel's Multimedia Communication Server 5100
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview...

Editeur : Syngress
Parution : 2006-08-31
PDF sans DRM

52,38

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing...

Editeur : Syngress
Parution : 2006-08-22
PDF sans DRM

34,19

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dictionary of Information Security
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms used in...

Editeur : Syngress
Parution : 2006-08-18
PDF sans DRM

26,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Combating Spyware in the Enterprise
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently...

Editeur : Syngress
Parution : 2006-08-04
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Video Conferencing over IP: Configure, Secure, and Troubleshoot
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video...

Editeur : Syngress
Parution : 2006-06-07
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  RFID Security
RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Editeur : Syngress
Parution : 2006-05-25
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring SonicWALL Firewalls
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. TheSonicWALL firewall appliance has had the largest annual growth in the security...

Editeur : Syngress
Parution : 2006-05-25
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
<< < 2829303132 >