Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • av Clint (Senior Premier Field Engineer at Microsoft) Huffman
    529,-

    Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems. This field guide gives you the tools and answers you need to improve Microsoft Windows performance, including: Save money on optimizing Windows performance with deep technical troubleshooting that tells you "What would Microsoft do to solve this?" Includes performance counter templates so you can collect the right data the first time.Learn how to solve performance problems using free tools from Microsoft such as the Windows Sysinternals tools and more.In a rush? Chapter 1 Start Here gets you on the quick path to solving the problem.Also covers earlier versions such as Windows 7 and Windows Server 2008 R2.

  • - Your Unauthorized Guide to Relational Database Security
    av Josh (Director Shaul
    706,-

    A practical guide to database administrators to secure their Oracle databases. It helps the DBA to assess their level of risk as well as their security posture. It provides practical, applicable knowledge to appropriately secure the Oracle database. It shows you how to securely integrate your database into your enterprise.

  • av Thomas (Director of IT Security Porter CISSP CCNP CCDA CCS
    790,-

    Suitable for the multitasked sys admin, this title presents an introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It also gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.

  • - Building Firewalls for Windows 2000
    av Syngress
    796,-

    Microsoft's flagship ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and Speed. This book provides the system administrators with an understanding of the features of this Internet Server.

  • av David (VMware VCP Rule
    790,-

    Details the default and custom installation of VMware's ESX server as well as basic and advanced virtual machine configurations. This book walks the reader through post installation configurations including installation and configuration of VirtualCenter.

  • av Frank (Owner Thornton
    850,-

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. This book is suitable for those individuals that use the Linux operating system.

  • av Pawan K ((MCSE Bhardwaj
    650,-

    Helps system administrators learn more than hundred tips for automating daily system administration tasks using Windows command line scripts.

  • av Stacy (Senior Member of the CERT technical staff and Chief Scientist at STAR* Lab) Prowell
    416,-

    Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including how to make your system more secure. This book includes attacks such as: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay.

  • av Syngress
    720,-

    A guide to developing mobile applications using Microsoft technologies. It focuses on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform.

  • av Syngress
    850,-

    Offers information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization.

  • av Syngress
    796,-

    Active Directory Services changes the way IT professionals design, plan, configure and administer their Windows NT networks. Systems Engineers will probably spend much of their time planning for and deploying Active Directory Services in many different environments. This book aims to provide coverage of everything they will need to succeed.

  • av Syngress
    720,-

    Written for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH) to the implementation of security policies, plans, and recovery protocols, this book helps users secure their wireless network before its security is compromised.

  • av Syngress
    336,-

    Choosing the right mobile phone and service plan can be overwhelming. This book aims to help consumers choose what program may best suit them. It helps streamline the wireless-buying process by providing a complete listing of wireless providers and the details of their plans. International listings include coverage of USA, Africa and Asia-Pacific.

  • - Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
    av Syngress
    576,-

    Deals with specific e-mail clients, server environments, and anti-virus software. This book places emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. It also shows how to scan content and counter email address forgery attacks.

  • av Brian Wotring
    736,-

    Talks about the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book cover what you need to know to correctly deploy a centralized host integrity monitoring solution.

  • - Countdown to Darkness
    av Rob Shein
    776,-

    Contains portrayals of researching, developing, and defending the Internet from a malicious "Zero-Day" attack. This book, about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists, is useful for the security and IT community.

  • av Syngress
    846,-

    Hundreds of thousands of business enterprises, large and small, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Part of the "Hack Proofing" series, this book gives system administrators the information they need to fortify their operating system against the never-ending threat of hackers.

  • av Wayne Lawson
    956,-

    Cisco AVVID allows businesses to transmit voice, data, and video over a single integrated architecture called a "converged" network. Intended for network administrators and engineers, this title covers history, protocols, hardware, servers, switches, bridges, and discussions about implementation issues, realities of cost and network limitations.

  • av Syngress
    720,-

    A guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. It covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. It gives an introduction to .NET and its XML building blocks - used to build a Web site.

  • av Syngress
    666,-

    Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Part of the "Hack Proofing" series, this book provides developers with step-by-step instructions for developing secure web applications.

  • av Syngress
    720,-

    Gives guidance to install and configure Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. It does not cover the Active Directory function of Windows 2000.

  • av Syngress
    720,-

    SQL Server 2000 is one of the key components of .NET. This title addresses the needs of IT professionals migrating from the popular SQL 7 databases to the SQL 2000, as well as those who are starting from scratch. It covers key features of SQL Server 2000 including; XML support, enhanced data-mining capabilities and integration with Windows 2000.

  • av Syngress
    900,-

    Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment. This work presents the hardware and software that comprise the Cisco IDS. It also covers Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs.

  • av Chris Ruston
    666,-

    Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95 per cent of all companies running it. This guide helps you avoid 'time drains' configuring the many different security standards built into Windows 2003, as well as secure VPN and Extranet Communications.

  • av Noam (Co-founder and CTO Rathaus
    930,-

    Fuzzing is often described as a 'black box' software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. This book teaches how fuzzing finds vulnerabilities. It shows how to eliminate buffer overflows and format strings.

  • av Frank (Owner Thornton
    720,-

    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. This title discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.

  • av Tom (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) St Denis
    946,-

    Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography, this book discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms, the implementation of symmetric ciphers and other codes and finally, portable coding practices.

  • - Auditing the Hacker Mind
    av Marcus Sachs
    776,-

    The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive or proprietary computer systems. This book demonstrates the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

  • - Including IPv6
    av Syngress
    946,-

    Focuses on planning and configuring networks and devices for IP 6. This book covers how to: increase the IP address size from 32 bits to 128 bits; support more levels of addressing hierarchy; support an increased number of addressable nodes; and, support simpler auto-configuration of addresses.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.