Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hardening Windows Systems

Buy
Hardening Windows Systems, 9780072253542 (0072253541), McGraw-Hill, 2004
Take a proactive approach to network security by hardening your Windows systems against attacks before they occur. Written by security evangelist Roberta Bragg, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you have one Windows server or one hundred, you’ll get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. With coverage of Windows 95/98/NT 4.0/2000/XP and Windows Server 2003, this book is an essential security tool for on-the-job IT professionals.
(HTML tags aren't allowed.)

Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level

The definitive book on the foundations and theory of database systems, including advanced topics not presented in any other survey book. Includes a comprehensive resource useful for any database researcher or practitioner that covers both fundamental and advanced topics.

Database theory is a relative newcomer to the field of computer...

Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobility is perhaps the most important market and technological trend
within information and communication technology. With the advent of new
mobile infrastructures providing higher bandwidth and constant connection
to the network from virtually everywhere, the way people use information
resources is predicted to be radically
...
The University of Google
The University of Google
University teaching is a special job. It is a joy to wake up in the morning knowing that during each working day, an extraordinary event or experience will jut out from the banal rhythms of administration, answering emails and endlessly buzzing telephones. Students, in these ruthless times, desperately want to feel something – anything...

Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Feedback Control for Computer Systems
Feedback Control for Computer Systems

How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through case studies and hands-on simulations, you’ll learn methods to...

Pro Android
Pro Android
At a high level, this book is about writing mobile applications for devices that support the Android Platform. Specifically, the book teaches you how to write applications using the Android SDK.

Who This Book Is For

This book is for software developers interested in writing mobile applications with the Android SDK. Because
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy