0 - 500
0
500

Linux for Hackers: A Complete Step-by-Step Guide to Hacking Wireless Network Security and Server Database with Technology Ecosystem Linux

Linux for Hackers: A Complete Step-by-Step Guide to Hacking Wireless Network Security and Server Database with Technology Ecosystem Linux

If you want to start learning to hack in a short time then keep reading…Do you want to learn about Kali Linux?Do you want to improve your knowledge about advanced security protocols? However, you aren’t sure where to begin?Does all the information available online seem overwhelming and quite complicated?If so, then this is the perfect…

Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase

Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase

This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing – including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc.…

Beginning Database Programming Using ASP.NET Core 3: With MVC, Razor Pages, Web API, jQuery, Angular, SQL Server, and NoSQL

Beginning Database Programming Using ASP.NET Core 3: With MVC, Razor Pages, Web API, jQuery, Angular, SQL Server, and NoSQL

Hit the ground running with this book to quickly learn the fundamentals of HTML form processing, user authentication, and database CRUD (Create, Read, Update, and Delete) operations using the ASP.NET Core family of technologies. You will utilize cutting-edge and popular technology options from both the server side and client side to help you achieve your…

How to Cheat at Designing Security for a Windows Server 2003 Network

How to Cheat at Designing Security for a Windows Server 2003 Network

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company’s #1 priority.While considering the security needs of your…

The Book of IMAP: Building a Mail Server with Courier and Cyrus

The Book of IMAP: Building a Mail Server with Courier and Cyrus

IMAP (the Internet Message Access Protocol) allows clients to access their email on a remote server, whether from the office, a remote location, or a cell phone or other device. IMAP is powerful and flexible, but it’s also complicated to set up; it’s more difficult to implement than POP3 and more error-prone for both client…

Guide to General Server Security

Guide to General Server Security

This document is intended to assist organizations in installing, configuring, and maintaining secure servers. More specifically, this document describes, in detail, the following practices to apply: * Securing, installing, and configuring the underlying operating system; * Securing, installing, and configuring server software: and * Maintaining the secure configuration through application of appropriate patches and upgrades,…

Webserver Security (German Edition)

Webserver Security (German Edition)

Studienarbeit aus dem Jahr 2011 im Fachbereich Informatik – IT-Security, Universität Augsburg, Veranstaltung: Internetsicherheit, Sprache: Deutsch, Abstract: In der vorliegenden Arbeit werden zu Beginn die zehn größten Risiken für Webanwendungen anhand von „OWASP Top 10 – 2010″ vorgestellt. Im nächsten Schritt wird die Realisierung von sicheren Webanwendungen auf Grundlage eines Ebenenmodells besprochen, sie basiert auf…

The CSF Firewall: For an effective server security

The CSF Firewall: For an effective server security

The subject of web server security is vast, and it is becoming bigger as time passes by. Every year, researches, both private and public, are adding to the number of possible threats to the security of web servers, and coming up with possible solutions to them. A number of these solutions are considered to be…