Wow! eBook: Securing SQL Server, 2nd Edition - 6 new eBooks |
- Securing SQL Server, 2nd Edition
- PCI Compliance, 3rd Edition
- Hacking Web Apps
- Keys to the Kingdom
- CISSP Study Guide, 2nd Edition
- Malware Forensics Field Guide for Windows Systems
Securing SQL Server, 2nd Edition Posted: 07 May 2013 10:36 AM PDT Book DescriptionWritten by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security.
Table of Contents Book Details
Related Books
The post Securing SQL Server, 2nd Edition appeared first on Wow! eBook. |
Posted: 07 May 2013 10:32 AM PDT Book DescriptionThe credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesn’t include the effects such security breaches have on the reputation of the companies that suffer attacks. PCI Compliance, 3e, helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure.
Table of Contents Book Details
Related Books
The post PCI Compliance, 3rd Edition appeared first on Wow! eBook. |
Posted: 07 May 2013 10:25 AM PDT Book DescriptionHow can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:
Even if you don’t develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser – sometimes your last line of defense – more secure.
Table of Contents Book Details
Related Books
The post Hacking Web Apps appeared first on Wow! eBook. |
Posted: 07 May 2013 10:19 AM PDT Book DescriptionLockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking. This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers or persons tasked with defending their infrastructure and property from invasion will find these techniques uniquely valuable. As with Deviant Ollam’s previous book, Practical Lock Picking, Keys to the Kingdom includes full-color versions of all diagrams and photographs. Check out the companion website which includes instructional videos that provide readers with a full-on training seminar from the author.
Table of Contents Book Details
Related Books
The post Keys to the Kingdom appeared first on Wow! eBook. |
CISSP Study Guide, 2nd Edition Posted: 07 May 2013 10:16 AM PDT Book DescriptionThe CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam’s Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam, including: Clearly stated exam objectives; Unique terms/Definitions; Exam Warnings; Learning by Example; Hands-On Exercises; Chapter ending questions. Furthermore, special features include: Two practice exams; Tiered chapter ending questions that allow for a gradual learning curve; and a self-test appendix
Table of Contents Book Details
Related Books
The post CISSP Study Guide, 2nd Edition appeared first on Wow! eBook. |
Malware Forensics Field Guide for Windows Systems Posted: 07 May 2013 10:13 AM PDT Book DescriptionDissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a ”tool” with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
Table of Contents Book Details
Related Books
The post Malware Forensics Field Guide for Windows Systems appeared first on Wow! eBook. |
You are subscribed to email updates from Wow! eBook To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
Tidak ada komentar:
Posting Komentar