Browse Results

Showing 53,976 through 54,000 of 54,282 results

All-in-One CISSP Exam Guide, Seventh Edition

by Shon Harris Fernando Maymi

This book covers everything you need to know to become an (ISC)2-certified CISSP. It teaches you the hows and whys behind organizations' development and implementation of policies, procedures, guidelines, and standards. It covers network, application, and system vulnerabilities; what exploits them; and how to counter these threats. The book explains physical security, operational security, and why systems implement the security mechanisms they do. It also reviews the U.S. and international security criteria and evaluations performed on systems for assurance ratings, what these criteria mean, and why they are used. This book also explains the legal and liability issues that surround computer systems and the data they hold, including such subjects as computer crimes, forensics, and what should be done to properly prepare computer evidence associated with these topics for court. While this book is mainly intended to be used as a study guide for the CISSP exam, it is also a handy reference guide for use after your certification.

How To Diagnose And Fix Everything Electronic

by Michael Jay Geier

Repair all kinds of electrical products, from modern digital gadgets to analog antiques, with help from this updated book. How to Diagnose and Fix Everything Electronic, Second Edition, offers expert insights, case studies, and step-by-step instruction from a lifelong electronics guru. Discover how to assemble your workbench, use the latest test equipment, zero in on and replace dead components, and handle reassembly. Instructions for specific devices, including stereos, MP3 players, digital cameras, flat-panel TVs, laptops, headsets, and mobile devices are also included in this do-it-yourself guide. Choose the proper tools and set up your workbench Ensure personal safety and use proper eye and ear protection Understand how electrical components work and why they fail Perform preliminary diagnoses based on symptoms Use test equipment, including digital multimeters, ESR meters, frequency counters, and oscilloscopes Interpret block, schematic, and pictorial diagrams Disassemble products and identify sections Analyze circuits, locate faults, and replace dead parts Re-establish connections and reassemble devices

CompTIA Network+® Guide to Managing and Troubleshooting Networks, Fourth Edition

by Mike Meyers

Essential Skills for a Successful IT Career Written by Mike Meyers, the leading expert on CompTIA certification and training, this up-to-date, full-color text will prepare you for CompTIA Network+ exam N10-006 and help you become an expert networking technician. Fully revised for the latest CompTIA Network+ exam, including coverage of performance-based questions, the book contains helpful on-the-job tips, end-of-chapter practice questions, and hundreds of photographs and illustrations. Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Fourth Edition covers: Network architectures Cabling and topology Ethernet basics Network installation TCP/IP applications and network protocols Routing Network naming Advanced networking devices IPv6 Remote connectivity Wireless networking Virtualization and cloud computing Network operations Managing risk Network security Network monitoring and troubleshooting Electronic content includes: 100+ practice exam questions in a customizable test engine 20+ lab simulations to help you prepare for the performance-based questions One hour of video training from Mike Meyers Mike's favorite shareware and freeware networking tools and utilities PDF copy of the book Each chapter features: Learning objectives Photographs and illustrations Real-world examples Try This! and Cross Check exercises Key terms highlighted Tech Tips, Notes, and Warnings Exam Tips End-of-chapter quizzes and lab projects Instructor resources available: Instructor's Manual Power Point slides for each chapter with photographs and illustrations from the book Test Bank cartridges with hundreds of questions for use as quizzes and exams Answers to the end of chapter sections are not printed in the book and are only available to adopting instructors

Web Scalability for Startup Engineers

by Artur Ejsmont

This is an invaluable roadmap for meeting the rapid demand to deliver scalable applications in a startup environment. With a focus on core concepts and best practices rather than on individual languages, platforms, or technologies, Web Scalability for Startup Engineers describes how infrastructure and software architecture work together to support a scalable environment. <p><p> You’ll learn, step by step, how scalable systems work and how to solve common challenges. Helpful diagrams are included throughout, and real-world examples illustrate the concepts presented. Even if you have limited time and resources, you can successfully develop and deliver robust, scalable web applications with help from this practical guide. <p><p> Learn the key principles of good software design required for scalable systems Build the front-end layer to sustain the highest levels of concurrency and request rates Design and develop web services, including REST-ful APIs; Enable a horizontally scalable data layer Implement caching best practices; Leverage asynchronous processing, messaging, and event-driven architecture; Structure, index, and store data for optimized search; Explore other aspects of scalability, such as automation, project management, and agile teams.

Principles Of Computer Security Lab Manual

by Vincent Nestler Keith Harrison Matthew Hirsch Wm. Conklin Corey Schou

Practice the Computer Security Skills You Need to Succeed! <p><p> 40+ lab exercises challenge you to solve problems based on realistic case studies <p> Step-by-step scenarios require you to think critically <p> Lab analysis tests measure your understanding of lab results <p> Key term quizzes help build your vocabulary <p> Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines

Multimedia - Making It Work

by Tay Vaughan

The Most Complete, Up-to-Date Multimedia Guide Thoroughly updated to cover the latest technologies, including mobile multimedia, this full-color resource prepares you for a successful multimedia career by teachingyou the fundamental concepts and required skills. Multimedia: Making It Work, Ninth Edition explains how to integrate text, images, sound, animation, and video into compelling projects. Multimedia project planning, costs, design, production, talent acquisition, testing, and delivery are also discussed. Chapter-ending quizzes reinforce key concepts and hands-on lab projects allow you to apply your new skills. Learn how to: Master the essential elements of multimedia, including text, images, sound, animation, and video Incorporate bitmap, vector, and 3-D images Record and edit digital audio and use MIDI Create computer-generated animations Shoot and edit digital video Select the best hardware, software, and authoring tools for your project Determine the scope and cost of a multimedia projectn Design, produce, and test your project Acquire the best content and talent for your budget Design dynamic Web content Create apps for mobile devices, including tablets, readers, and smartphones Deliver multimedia over the Internet, in an app store, and on CD-ROM and DVD Each chapter includes: Learning objectives Full-color illustrations and screenshots Helpful notes, tips, and warnings Chapter summaries and key term lists End-of-chapter quizzes and lab projects This book is intended for students enrolled in an instructor-led course and does not provide correct answers for the end-of-chapter quizzes or access to the instructor's resource materials. If you are an instructor, please contact your McGraw-Hill Education sales representative for details.

Epic Content Marketing: How to Tell a Different Story, Break Through the Clutter, and Win More Customers By Marketing Less

by Joe Pulizzi

One of FORTUNE Magazine''s Top 5 Business Book Must-Reads How do you cut through the noise, commotion, and bad information that is right now cluttering up your customers'' digital space? EPIC CONTENT MARKETING One of the world''s leading experts on content marketing, Joe Pulizzi explains how to attract prospects and customers by creating information and content they actually want to engage with. No longer can we interrupt our customers with mediocre content and sales messages they don't care about. Epic Content Marketing takes you step-by-stepthrough the process of developing stories that inform and entertain and compel customers to act--without actually telling them to. Epic content, distributed to the right person at the right time, is the way to truly capture the hearts and minds of customers. It''s how to position your business as a trusted expert in its industry. It''s what customers share and talk about. Once we hook customers with epic content, they reward us by sending our sales through the roof. Epic Content Marketing provides everything youneed to: Determine what your content niche should be to attract and retain customers Discover and develop your content marketing mission statement Set up a process for creating and curating epic content Learn how to leverage social and e-mail channels to create--and grow--your audience Measure the performance of your content--and increase your content marketing budget With in-depth case studies of how John Deere, LEGO, Coca-Cola, and other leading corporations are using content to drive epic sales, this groundbreaking guide gives you all the tools to start creating and disseminating content that leads directly to greater profits and growth. Whether you''re the CMO of a Fortune 500, a digital marketer, or an entrepreneur, Epic Content Marketing gives you the tools you need to vanquish the competition. Start your epic journey now! PRAISE FOR EPIC CONTENT MARKETING "From the man who invented content marketing. Listen to this guy. He really understands the new world of marketing. The concepts in Epic Content Marketing are usable all over the world--instantly usable and useful for any business. " -- Don Schultz, the "father of integrated marketing," Professor Emeritus at Northwestern University''s Medill School of Journalism, and author of 13 books "Joe Pulizzi''s ideas are so consistently . . . well, epic (!) that they really don''t need any endorsement by anyone. But here's mine anyway: You don''t need MORE content. You need the right kind of content,strategically applied. For those organizations struggling to create a content marketing program that drives results, Joe delivers. Again. " -- Ann Handley, coauthor of Content Rules and Chief Content Officer, MarketingProfs "As Joe shows us in his wonderful Epic Content Marketing, you must unlearn interrupting people with your nonsense. Instead, publish the valuable content they want to consume and are eager to share. " -- David Meerman Scott, marketing strategist and bestselling author ofThe New Rules of Marketing and PR "This is a brilliant canter through the rapid and ever-changing world of content marketing. Joe has managed to capture the right blend of art and science as he plots the major trends impacting all marketers right now. " -- Jonathan Mildenhall, VP, Global Advertising Strategy and Creative Excellence, Coca-Cola Company "You could say that Joe Pulizzi wrote the book on content marketing, but now it''s more than just a saying. It''s what you're holding in your hands. If you truly want to be successful at content marketing, Pulizzi is one of the few who can show you the way. " -- Mitch Joel, President, Twist Image, and author of Six Pixels of Separation and CTRL ALT Delete "Joe Pulizzi may know more about content marketing than any person alive. He proves it in these pages. " -- Jay Baer, New York Times

Networking: A Beginner's Guide 6th Edition

by Bruce Hallberg

Thoroughly revised to cover the latest technologies, this practical resource provides you with a solid foundation in networking fundamentals. Networking: A Beginner's Guide, Sixth Edition discusses wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, and virtualization. You'll also get step-by-step instructions for installing, configuring, and managing Windows Server 2012, Exchange Server 2013, Oracle Linux, and Apache. This is the perfect book for anyone starting a networking career or in need of an easy-to-follow refresher.

Programming the Raspberry Pi: Getting Started with Python

by Simon Monk

<P>The Raspberry Pi is rapidly becoming a worldwide phenomena.<P> People are waking up to the possibility of a $35 (U.S.) computer that can be put to use in all sorts of settings--from a desktop workstation to a media center to a controller for a home automation system.

CompTIA A+ Certification Study Guide (Exams 220-801 & 220-802), Eighth Edition

by Jane Holcombe Charles Holcombe

This Study Guide helps you prepare for and pass the required exams so you can begin to reap the career benefits of CompTIA A+ certification. This book will also serve you as a valuable professional resource after your exams. The book is organized in such a way as to serve as an in-depth review for the 2012 CompTIA A+ exams: Exam 220-801 and Exam 220-802. Each chapter covers a major aspect of the exams, with an emphasis on the "why" as well as the "how to" of IT support in the areas of installation, configuration, and maintenance of devices, PCs, and software; networking and security/forensics; diagnosis, resolution, and documentation of common hardware and software issues; troubleshooting; virtualization; desktop imaging; and deployment.

Network Security: A Beginner's Guide (Third Edition)

by Eric Maiwald

Security Smarts for the Self-Guided IT Professional Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include thelatest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption technologies arediscussed in detail. The book explains how to create and deploy an effective security policy, manage and assess risk, and perform audits. Information security best practices and standards, including ISO/IEC 27002, arecovered in this practical resource. Network Security: A Beginner's Guide, ThirdEdition features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work

The Laws of Subtraction: 6 Simple Rules for Winning in the Age of Excess Everything

by Matthew May

Winner of a 2013 Small Business Book Award for Economics The world is more overwhelming than ever before. Our work is deeper and more demanding than ever. Our businesses are more complicated and difficult to manage than ever. Our economy is more uncertain than ever. Our resources are scarcer than ever. There is endless choice and feature overkill in all but the best experiences. Everybody knows everything about us. The simple life is a thing of the past. Everywhere, there's too much of the wrong stuff and not enough of the right. The noise is deafening, the signal weak. Everything is too complicated and time-sucking. Welcome to the age of excess everything. Success in this new age looks different and demands a new skill: Subtraction. Subtraction is defined simply as the art of removing anything excessive, confusing, wasteful, unnatural, hazardous, hard to use, or ugly . . . or the discipline to refrain from adding it in the first place. And if subtraction is the new skill to be acquired, we need a guide to developing it. Enter The Laws of Subtraction. Through a dozen of the most compelling stories of breakthrough innovation culled from 2,000 cases and bolstered by uniquely personal essays contributed by over 50 of the most creative minds in business today, The Laws of Subtraction outlines six simple rules for winning in the age of excess everything, and delivers a single yet powerful idea: When you remove just the right things in just the right way, something very good happens. The Laws of Subtraction features contributions by over 50 highly regarded thinkers, creatives, and executives. On Law #1: What Isn't There Can Often Trump What Is "When you reduce the number of doors that someone can walk through, more people walk through the one that you want them to walk through. " -- SCOTT BELSKY, founder and CEO of Behance and author of Making Ideas Happen On Law #2: The Simplest Rules Create the Most Effective Experience "Keeping it simple isn't easy. By exploiting subtraction in innovation, we've been able to create an environment of freedom and creativity that allows us to thrive. " -- BRAD SMITH, CEO, Intuit On Law #3: Limiting Information Engages the Imagination "Subtraction can mean the difference between a highly persuasive presentation and a long, convoluted, and confusing one. Why say more when you can say less?" -- CARMINE GALLO, author of The Apple Experience On Law #4: Creativity Thrives Under Intelligent Constraints "Here's the key to the conundrum for managers who want to stoke the innovation fire: That close cousin of scarcity, constraint, can indeed foster creativity. " -- TERESA AMABILE, author of The Progress Principle On Law #5: Break Is the Important Part of Breakthrough "If you kill the butterflies in your stomach, you'll kill the dream. Embrace the feeling. Save the butterflies. " -- JONATHAN FIELDS, author of Uncertainty On Law #6: Doing Something Isn't Always Better Than Doing Nothing "When we're faced with the greatest odds against us, often we need to edit rather than add. " -- CHIP CONLEY, cofounder of Joie de Vivre Hospitality and author of Emotional Equations

Comptia A+ Certification All-In-One Exam Guide (Exams 220-801 & 220-802)

by Michael Meyers

The bestselling CompTIA A+ reference and test preparation guide--fully revised for the new 2012 exam topics Written by the leading authority on CompTIA A+ certification and training, the new edition of this trusted resource offers complete, up-to-date coverage of CompTIA A+ exams 220-801 and 220-802. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Prepare for the exams with confidence! McGraw-Hill is a Gold-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. This comprehensive guide also serves as an essential on-the-job reference after certification. Covers all exam objectives, including how to: Work with CPUs, RAM, BIOS settings, motherboards, power supplies, and other PC components Install, configure, and troubleshoot hard drives Manage input devices and removable media Install, upgrade, and troubleshoot Windows XP, Windows Vista, and Windows 7 Troubleshoot all common PC problems Install video and multimedia cards Work with smartphones, tablets, and other mobile devices Install and configure wired and wireless networks Connect to the Internet Protect your PC and your network Install, configure, and manage printers Work with virtualization technologies Understand safety and environmental issues Electronic content includes: Practice exams for 801 & 802 with hundreds of questions More than one hour of free video training from Mike Meyers A collection of Mike's latest favorite shareware and freeware PC tools and utilities Adobe Digital Edition eBook--free download (subject to Adobe's system requirements)

All in One CompTIA Network+: Exam N10-005 (Fifth Edition)

by Mike Meyers

Written by CompTIA certification and training expert Mike Meyers, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Network+ exam with ease, this definitive volume also serves as an essential on-the-job reference.

Wireless Network Security

by Brock Pearson Tyler Wrightson

Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. "Wireless Network Security: A Beginner's Guide" discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away. "Wireless Network Security: A Beginner's Guide" features: Lingo--Common security terms defined so that you re in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work "This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. " - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012) "

HTML & XHTML Demystified

by Lee Cottrell

Hard stuff made easy! Your practical, self-paced guide to HTML and XHTML HTML and XHTML Demystified is a hands-on tutorial that gives you thorough guidance on required Web design techniques and technologies. The book also functions as a useful supplement for textbooks and classroom activities by focusing on the essentials and the most useful tags and properties, while avoiding unnecessary details. Learn to create Web pages, add graphics and links, create tables and frames, integrate forms, and more. Each chapter features valid HTML that follows all of the rules set by the W3C and incorporates the latest standards for HTML5. Web designers need to write pages that are accessible to all users, so each chapter is coded to address the accessibility requirements from the Americans with Disabilities Act and to allow the use of non-English characters. HTML and XHTML Demystified Covers HTML, XHTML, HTML5, and CSS Develops two stand-alone examples per chapter: one created by the author; the other for you to practice Helps you recognize and resolve common HTML errors Includes end-of-chapter quizzes and a final exam to reinforce learning Step-by-step coverage: HTML and The Web; Your First Web Pages; Inserting Graphics; Creating Hyperlinks; Using Lists; Building Tables; Gathering Data with Forms; Page Layout; Scripting; DHTML; Effectively Using Multimedia; Using Frames; Creating a Web Site

Gray Hat Hacking: The Ethical Hacker's Handbook (Third Edition)

by Allen Harper Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams

This book provides a holistic review of ethical hacking. It is developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

Comptia A+ Certification: All-in-One Exam Guide (7th Edition)

by Michael Meyers

Get complete coverage of the latest release of the CompTIA A+ exams inside this fully revised and updated resource. Written by the leading authority on CompTIA A+ certification and training, this expert guide covers CompTIA A+ exams 220-701 and 220-702. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, in-depth explanations, and more than 1,000 photographs and illustrations. Designed to help you pass the CompTIA A+ exams with ease, this definitive volume also serves as an essential on-the-job IT reference. Covers all exam objectives, including how to: Work with CPUs, RAM, motherboards, power supplies, and other PC components Install, partition, and format hard drives Install, upgrade, and troubleshoot Windows 2000, Windows XP, and Windows Vista Troubleshoot PCs and implement security measures Install video and multimedia cards Work with portable PCs, PDAs, smartphones, and wireless technologies Manage printers and connect to networks and the Internet Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Practice exams for 701 & 702 600+ chapter review questions New video introduction to CompTIA A+ One-hour video training segment Mike's favorite PC tools and utilities Searchable e-book Mike Meyers, CompTIA A+, CompTIA Network+, MCP, is the industry's leading authority on CompTIA A+ certification and training. He is the president and founder of Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations throughout the world, and a member of CompTIA.

Turn Clicks Into Customers: Proven Marketing Techniques For Converting Online Traffic Into Revenue

by Duane Forrester

THE MAIN PURPOSE of this book is to help you monetize your Web site. While that might sound exciting, keep in mind that it takes a lot of work to accomplish. Whether you have a small or large Web site is immaterial for this discussion--scale matters less than structure and your willingness to follow specific best practices.

Computer Forensics: Secrets and Solutions (Second Edition)

by Aaron Philipp David Cowen Chris Davis

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. . . . Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations. " --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny

24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them

by Michael Howard David LeBlanc John Viega

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:

Hacking Exposed: Network Security Secrets and Solutions (6th Edition)

by Stuart Mcclure Joel Scambray George Kurtz

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

Hacking Exposed Windows: Microsoft Security Secrets and Solutions (Third Edition)

by Joel Scambray Stuart Mcclure

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to: Establish business relevance and context for security by highlighting real-world risks Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services See up close how professional hackers reverse engineer and develop new Windows exploits Identify and eliminate rootkits, malware, and stealth software Fortify SQL Server against external and insider attacks Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomizationion

Guide to Internet Job Searching: 2002-03 Edition

by Frances E. Roehm Margaret Riley Dikel

Copublished by America's foremost career books publisher and the Public Library Association, the acclaimed Guide to Internet Job Searching helps you harness the power of the Internet to aid in your job search. The Internet has revolutionized the way people look for career opportunities, and with this guide, you, too, can efficiently and successfully explore the Web to find the right job for you. This bestselling guide shows you how to target the most interesting jobs in the most promising companies and apply for those jobs with confidence-online or on paper. And it will steer you away from electronic "dead ends" such as unproductive searches that turn up thousands of near misses. Whether you are a complete beginner or an online expert, you'll find invaluable advice inside to make your Internet job search streamlined, efficient, and effective-from logging on to landing the perfect job. Margaret Riley Dikel, author of The Riley Guide (rileyguide.com), is a private consultant specializing in the use of the Internet for employment and career information. She is an internationally recognized authority in this field, having worked for many prominent governmental agencies and public and private corporations. Frances E, Roehm is the SkokieNet librarian at the Skokie (Illinois) Public Library where she specializes in building the village's community online. She is also the webmaster for ChicagoJobs.org, a regional resource for Chicagoland job hunters and career changers, and assists individuals in using the Internet to find a job. She currently chairs the PLA Job and Career Information Services committee.

How to Be a Successful Online Student

by Sara Dulaney Gilbert

According to the National Center for Education Statistics more than 85% of public universities offer non-residential long-distance learning and courses, degrees, or career credentials.

Refine Search

Showing 53,976 through 54,000 of 54,282 results