Security Books
-
VMware ESXi: Planning, Implementation, and Security
Published 10 years ago
by Dave Mishchenko, Course Technology PTR
VMware ESXi is the easiest way to get started with virtualization -- and it's free. It allows administrators to consolidate their applications onto fewer servers and start saving money through reduced hardware, power, cooling, and administration costs. VMware ESXi has been optimized and tested to run even their most resource-intensive applications and databases with minimal performance overhead.
-
Microsoft SQL Server 2008 Administration for Oracle DBAs
Published 10 years ago
by Mark Anderson, James Fox, Christian Bolton, McGraw-Hill Osborne Media
An expert guide to working with SQL Server in a mixed-database environmentMicrosoft SQL Server Administration for Oracle DBAs is the ideal resource for experienced Oracle database professionals looking to expand their knowledge and skill set into the Microsoft database platform. The book compares and contrasts the platform architectures and shows how to perform everyday database administrator tasks. Screenshots, script examples, and step-by-step labs are included in this practical guide.
-
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Published 10 years ago
by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard, Wiley
A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software.
-
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
Published 10 years ago
by Michael Kerrisk, No Starch Press
The Linux Programming Interface is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system.In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls and library functions that you need in order to master the craft of system programming, and accompanies his explanations with clear, complete example programs.
-
Microsoft Access 2010 VBA Macro Programming
Published 10 years ago
by Richard Shepherd, McGraw-Hill Osborne Media
Take your database skills to the next level—develop powerful, custom Access 2010 applications using Visual Basic for ApplicationsMicrosoft Access 2010 VBA Macro Programming guides you through the structure of VBA, showing you how to use it specifically in Access. The book explains, step by step, how to write VBA code—from the basics to dealing with errors and debugging code. This practical guide includes examples that illustrate how to use VBA in Access to do specific tasks.
-
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
Published 10 years ago
by Joel Scambray, Vincent Liu, Caleb Sima, McGraw-Hill Osborne Media
The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures.
-
Secure Java: For Web Application Development
Published 10 years ago
by Abhay Bhargav, B. V. Kumar, CRC Press
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and Web application risk assessment. Encapsulating security requirements for Web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling—explaining how to integrate these practices into a secure software development life cycle.
-
JUNOS Security
Published 10 years ago
by Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn, O'Reilly Media
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.
-
Access 2010 Programmer's Reference (Wrox Programmer to Programmer
Published 10 years ago
by Teresa Hennig, Rob Cooper, Geoffrey L. Griffith, Jerry Dennison, Wrox
A comprehensive guide to programming for Access 2010 and 2007Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements.
-
The Accidental Administrator: Cisco ASA Security Appliance: Configuring and Managing the Cisco ASA Security Appliance
Published 10 years ago
by Don R Crawley, CreateSpace
A clearly written, easy-to-follow step-by-step guide to configuring and managing the Cisco ASA Security Appliance. This book takes you from initial installation and setup, through backups and restores, to remote administration, to creating VPNs and DMZs, and more. You'll work in both the graphical user interface using the Cisco Adaptive Security Device Manager (ASDM) and in the command line interface.