Operating Systems category: 3874 books

Cover of Kali Linux – Assuring Security by Penetration Testing
by Lee Allen, Tedi Heriyanto, Ali Shakeel
Language: English
Release Date: April 7, 2014

Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing...
Cover of The Real MCTS/MCITP Exam 70-648 Prep Kit

The Real MCTS/MCITP Exam 70-648 Prep Kit

Independent and Complete Self-Paced Solutions

by Brien Posey
Language: English
Release Date: June 3, 2008

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the...
Cover of Penetration Tester's Open Source Toolkit
by Jeremy Faircloth
Language: English
Release Date: September 20, 2016

Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing...
Cover of Information Technology

Information Technology

An Introduction for Today's Digital World

by Richard Fox
Language: English
Release Date: February 8, 2013

Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts they will encounter throughout their IT studies and careers. The book covers computer organization and hardware, Windows and Linux operating systems, system administration duties, scripting, computer networks, regular ex
Cover of Mastering vRealize Automation 6.2
by J. Powell
Language: English
Release Date: September 30, 2015

Enable virtualization, automation, and efficient cloud management in your environment with vRealize Automation 6.2About This BookLearn the best practices of system architecture and design of the newly released vRealize Automation 6.2Resolve common pitfalls during the configuration and customization...
Cover of A Practical Guide to Trusted Computing
by David Challener, Kent Yoder, Ryan Catherman
Language: English
Release Date: December 27, 2007

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable   Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a...
Cover of Privileged Attack Vectors

Privileged Attack Vectors

Building Effective Cyber-Defense Strategies to Protect Organizations

by Brad Hibbert, Morey J. Haber
Language: English
Release Date: December 8, 2017

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network,...
Cover of Malicious Mobile Code

Malicious Mobile Code

Virus Protection for Windows

by Roger A. Grimes
Language: English
Release Date: August 14, 2001

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange....
Cover of Systems Engineering for Business Process Change: New Directions

Systems Engineering for Business Process Change: New Directions

Collected Papers from the EPSRC Research Programme

by
Language: English
Release Date: December 6, 2012

Systems Engineering for Business Process Change: New Directions is a collection of papers resulting from an EPSRC managed research programme set up to investigate the relationships between Legacy IT Systems and Business Processes. The papers contained in this volume report the results from the projects...
Cover of Kali Linux Wireless Penetration Testing Cookbook
by Sean-Philip Oriyano
Language: English
Release Date: December 13, 2017

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes About This Book Expose wireless security threats through the eyes of an attacker, Recipes to help you proactively identify vulnerabilities and apply intelligent remediation, Acquire and apply key...
Cover of Microsoft DirectAccess Best Practices and Troubleshooting
by Jordan Krause
Language: English
Release Date: October 14, 2013

This book covers best practices and acts as a complete guide to DirectAccess and automatic remote access.Microsoft DirectAccess Best Practices and Troubleshooting is an ideal guide for any existing or future DirectAccess administrator and system administrators who are working on Windows Server 2012....
Cover of Blockchain for Business
by Jai Singh Arun, Jerry Cuomo, Nitin Gaur
Language: English
Release Date: January 30, 2019

The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain "Blockchain’s potential to transform businesses has generated a tremendous amount of excitement across industries. However, it can be difficult for decision makers to develop a practical approach to blockchain...
Cover of VMware vRealize Configuration Manager Cookbook
by Abhijeet Shriram Janwalkar
Language: English
Release Date: July 18, 2016

Over 80 recipes to teach you the power of vRealize Configuration Manager 5.8 to provide automated and continuous configuration management About This Book First book in the market that provides a broad configuration and compliance management solution for your enterprise. Champion the skills of...
Cover of Learning iOS Security
by Allister Banks, Charles S. Edge
Language: English
Release Date: February 27, 2015

This book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage.
First 16 17 18 19 20 21 2223 24 25 26 27 28 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy