0 - 500
0
500

Absolute FreeBSD, 3rd Edition: The Complete Guide to FreeBSD

Absolute FreeBSD, 3rd Edition: The Complete Guide to FreeBSD

This updated edition of Michael W. Lucas’ definitive volume on FreeBSD-based systems adds coverage of modern disks, the ZFS filesystem IPv6, redesigned jail and packaging systems, and virtualization, among dozens of new features added in the last 10 years.FreeBSD is the muscle behind companies like Netflix and EMC. Any place where someone does heavy lifting…

DNS Security Management (IEEE Press Series on Networks and Service Management)

DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies   DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating…

Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam

Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based…

Tableau Your Data!: Fast and Easy Visual Analysis with Tableau Software

Tableau Your Data!: Fast and Easy Visual Analysis with Tableau Software

Premier guide with expert guidance on building dynamic, BI data visualizations Tableau Software is designed to provide fast and easy data visualization for business intelligence, and Tableau Your Data! is the ultimate guide to using it effectively. Expert discussion and plain-English explanations merge with full-color visuals and step-by-step instruction to demonstrate streamlined analytics workflow. Regardless…

Implementing SSL/TLS

Implementing SSL/TLS

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have…

Guide to Operating Systems Security

Guide to Operating Systems Security

Guide to Operating Systems Security is designed to expand networking student’s basic network and operating system skills to include planning, implementation, and auditing of a system’s security. This text covers a variety of operating systems, including a Windows client operating system, Windows server operating system, Linux, Novell NetWare, and Mac OS. Each chapter offers extensive…

Beginning SQL Server for Developers

Beginning SQL Server for Developers

Beginning SQL Server for Developers is the perfect book for developers new to SQL Server and planning to create and deploy applications against Microsoft’s market-leading database system for the Windows platform. Now in its fourth edition, the book is enhanced to cover the very latest developments in SQL Server, including the in-memory features that are…

From Access to SQL Server

From Access to SQL Server

This book covers what Access developers need to know about SQL Server, covering the two most common versions of both products: Microsoft Access 97 and 2000 and Microsoft SQL Server 6.5 and 7. The author offers his own tips and techniques based on practical hands-on experience. The resulting book teaches developers how to accomplish their…

Operating System Concepts

Operating System Concepts

Operating System Concepts, now inits ninth edition, continues to provide a solidtheoretical foundation for understanding operatingsystems. The ninth edition has been thoroughly updated toinclude contemporary examples of how operating systems function.The text includes content to bridge the gap between concepts andactual implementations. End-of-chapter problems, exercises, reviewquestions, and programming exercises help to further reinforceimportant concepts.  A new Virtual Machine providesinteractive exercises…

The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws

The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending…