Security Books



Bookstore > Books > Security

VMware Cookbook, 2nd Edition

VMware Cookbook, 2nd Edition

by Ryan Troy, Matthew Helmke

With scores of step-by-step solutions, this cookbook helps you work with VMware ESXi in a wide range of network environments. You'll not only learn the basics - how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute them among virtual machines - but also how to overcome the stumbling blocks you'll encounter when you monitor systems, troubleshoot ...

Price:  $32.94  |  Publisher:  O'Reilly Media  |  Release:  2012

Windows 8 Hacks

Windows 8 Hacks

by Preston Gralla

Windows 8 is quite different than previous Microsoft operating systems, but it's still eminently hackable. With this book, you'll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that's just the beginning. You'll find more than 100 standalone hacks on performance, multimedia, ...

Price:  $24.00  |  Publisher:  O'Reilly Media  |  Release:  2012

OS X Mountain Lion: The Missing Manual

OS X Mountain Lion: The Missing Manual

by David Pogue

What do you get when you cross a Mac with an iPad? OS X 10.8 Mountain Lion. Its 200 new features include iPaddish goodies like dictation, Notification Center, and Reminders - but not a single page of instructions. Fortunately, David Pogue is back, with the expertise and humor that have made this the #1 bestselling Mac book for over 10 years straight.Big-ticket changes - Twitter and Facebook intgration. Air-...

Price:  $5.99  |  Publisher:  O'Reilly Media  |  Release:  2012

Master Your Mac

Master Your Mac

by Matt Cone

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security, author Matt Cone will show you how to tweak, customize, and control your Mac. And since many of ...

Price:  $3.95  |  Publisher:  No Starch Press  |  Release:  2012

SOA Governance in Action

SOA Governance in Action

by Jos Dirksen

SOA Governance in Action shows developers how to apply governance concepts and implementation practices to achieve success in SOA projects. You'll learn practical techniques like building a metadata repository using WSO2 Registry or a custom monitoring dashboard using Bamos BAM. You'll also explore other supporting tools, such as using OpenAM, to implement security related policies. Along the way,...

Price:  $7.70  |  Publisher:  Manning  |  Release:  2012

Metasploit Penetration Testing Cookbook

Metasploit Penetration Testing Cookbook

by Abhinav Singh

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear un...

Price:  $29.99  |  Publisher:  Packt Publishing  |  Release:  2012

Advanced Penetration Testing for Highly-Secured Environments

Advanced Penetration Testing for Highly-Secured Environments

by Lee Allen

Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab....

Price:  $35.99  |  Publisher:  Packt Publishing  |  Release:  2012

Governance, Risk, and Compliance Handbook for Oracle Applications

Governance, Risk, and Compliance Handbook for Oracle Applications

by Nigel King, Adil R Khan

Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more. Risk Management: Creating a risk management program, performing risk assessment and control verification, and more. Compliance Management: Cross-industry, cross-regional laws and regulations, industry-specific laws...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2012

Java EE 6 Cookbook for Securing, Tuning, and Extending Enterprise Applications

Java EE 6 Cookbook for Securing, Tuning, and Extending Enterprise Applications

by Mick Knutson

Secure your Java applications using Java EE built-in features as well as the well-known Spring Security framework. Utilize related recipes for testing various Java EE technologies including JPA, EJB, JSF, and Web services. Explore various ways to extend a Java EE environment with the use of additional dynamic languages as well as frameworks. A learn-by-example based approach that focuses on key concepts to ...

Price:  $23.99  |  Publisher:  Packt Publishing  |  Release:  2012

Microsoft System Center 2012 Endpoint Protection Cookbook

Microsoft System Center 2012 Endpoint Protection Cookbook

by Andrew Plue

Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems against threats with leading malware detection technologies. Built on Configuration Manager, it provides a unified infrastructure for client security and compliance management and "Microsoft System Center 2012 Endpoint Protection Cookbook" w...

Price:  $15.72  |  Publisher:  Packt Publishing  |  Release:  2012

Pages: ←Previous | 1 ... 58, 59, 60, 61, 62 ... 74 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.