Security Books



Bookstore > Books > Security

Active Directory, 5th Edition

Active Directory, 5th Edition

by Brian Desmond, Joe Richards, Robbie Allen, Alistair G. Lowe-Norris

Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.You'll negotiate a maze of technologies for deploying a scalable and reliable AD inf...

Price:  $30.78  |  Publisher:  O'Reilly Media  |  Release:  2013

Programming Grails

Programming Grails

by Burt Beckwith

Dig deeper into Grails architecture and discover how this application framework works its magic. Written by a core developer on the Grails team, this practical guide takes you behind the curtain to reveal the inner workings of its 2.0 feature set. You'll learn best practices for building and deploying Grails applications, including performance, security, scaling, tuning, debugging, and monitoring.Under...

Price:  $32.45  |  Publisher:  O'Reilly Media  |  Release:  2013

Mac Hacks

Mac Hacks

by Chris Seibold

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn't expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them to.There are more than 50 hacks in this book that show you how to fine-tune ...

Price:  $19.99  |  Publisher:  O'Reilly Media  |  Release:  2013

802.11ac: A Survival Guide

FREE EBOOK - 802.11ac: A Survival Guide

by Matthew Gast

The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.Author Matthew Gast-an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance - expla...

Price:  $13.79  |  Publisher:  O'Reilly Media  |  Release:  2013

Test-Driven Infrastructure with Chef, 2nd Edition

Test-Driven Infrastructure with Chef, 2nd Edition

by Stephen Nelson-Smith

Since Test-Driven Infrastructure with Chef first appeared in mid-2011, infrastructure testing has begun to flourish in the web ops world. In this revised and expanded edition, author Stephen Nelson-Smith brings you up to date on this rapidly evolving discipline, including the philosophy driving it and a growing array of tools. You'll get a hands-on introduction to the Chef framework, and a recommended ...

Price:  $29.55  |  Publisher:  O'Reilly Media  |  Release:  2013

Third-Party JavaScript

Third-Party JavaScript

by Ben Vinegar, Anton Kovalyov

There's an art to writing third-party JavaScript - embeddable scripts that can plug into any website. They must adapt easily to unknown host environments, coexist with other applications, and manage the tricky security vulnerabilities you get when code and asset files are served from remote web addresses. Get it right and you have unlimited options for distributing your apps. This unique book shows you...

Price:  $39.99  |  Publisher:  Manning  |  Release:  2013

Mondrian in Action

Mondrian in Action

by William D. Back, Nicholas Goodman, Julian Hyde

Mondrian is an open source, lightning-fast data analysis engine designed to help you explore your business data and perform speed-of-thought analysis. Mondrian can be integrated into a wide variety of business analysis applications and learning it requires no specialized technical knowledge.Mondrian in Action teaches you to use Mondrian for strategic business analysis. In it, you'll learn how to organi...

Price:  $26.85  |  Publisher:  Manning  |  Release:  2013

JBoss AS 7 Development

JBoss AS 7 Development

by Francesco Marchioni

JBoss Application Server meets high standards of reliability, efficiency, and robustness, and is used to build powerful and secure Java EE applications. It supports the most important areas of Java Enterprise programming including EJB 3.1, Contexts and Dependency Injection, JAX-WS and JAX-RS web services, the security framework, and more. Getting started with JBoss application server development can be chal...

Price:  $10.88  |  Publisher:  Packt Publishing  |  Release:  2013

Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux

by Joseph Muniz, Aamir Lakhani

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in pla...

Price:  $29.99  |  Publisher:  Packt Publishing  |  Release:  2013

Open Source Identity Management Patterns and Practices Using OpenAM 10.x

Open Source Identity Management Patterns and Practices Using OpenAM 10.x

by Waylon Kenning

OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diverse web applications that might typically operate against a disparate s...

Price:  $14.99  |  Publisher:  Packt Publishing  |  Release:  2013

Pages: ←Previous | 1 ... 55, 56, 57, 58, 59 ... 74 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.