著者:Kevin Mitnick
出版社: Little, Brown and Company
発売日: 2011年08月15日
In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother a……続きを見る
This sneak peek teaser - featuring literary giants John Grisham and Danielle Steele - from Chapter 2 of The Bestseller Code, a groundbreaking book about what a computer algorithm can teach us about ……続きを見る
The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in ……続きを見る
This book tells the story of a common dream: Agile Inclusive Accelerator. The story of a project developed by many hands, which started with the arrival of ThoughtWorks in Tecnopuc and has been grow……続きを見る
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam
Take the latest version of the CompTIA Security+ exam with complete confidence using the detail……続きを見る
README.TXTFrom: Computer Tech to Network Administrator is a straightforward and sometimes comical look into the everyday world of information technology. It answers questions that many IT profession……続きを見る
Written by experts in the field, this indispensable guide provides a services-patterns approach to transforming IT infrastructures to a virtualized state to derive compelling business value for orga……続きを見る
Packed with practical recipes, this is a step-by-step guide to learning data visualization with D3 with the help of detailed illustrations and code samples.If you are a developer familiar with HTML,……続きを見る
This is a Packt Beginner's Guide, which means it is packed with clear step-by-step instructions for performing the most useful tasks in MooTools. You will learn by doing and you will start learning ……続きを見る
Hacking the Cube is a straightforward and sometimes comical look into the everyday world of information technology. It answers questions that many IT professionals and newcomers ask about the tools ……続きを見る
Intelligent IT Outsourcing enables practitioners to focus in on the essential issues that need to be addressed so that the fundamental structure of their sourcing strategy and its implementation is ……続きを見る
Each recipe comprises step-by-step instructions followed by the analysis of what was done in each task and other useful information. The book is designed so that you can read it chapter by chapter, ……続きを見る
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The bo……続きを見る
This title covers Coherence features progressively, from simple to more advanced topics, and provides best-practice guidance on when and how to use each. Numerous examples are provided throughout th……続きを見る
Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advan……続きを見る
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for mo……続きを見る
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provid……続きを見る
Written by Ganglia designers and maintainers, this book shows you how to collect and visualize metrics from clusters, grids, and cloud infrastructures at any scale. Want to track CPU utilization fro……続きを見る
As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing conti……続きを見る
This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba ……続きを見る
This is a cookbook of easy-to-follow recipes about ACT! 2011 dashboard and report practices. If you are an ACT! end user who wants to learn about the existing reports and dashboards available in ACT……続きを見る
This book has a tutorial approach that provides both theoretical explanations and practical step-by-step examples using familiar Oracle demo schemas. Step-by-step examples include use of both Enterp……続きを見る
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpr……続きを見る
The book is uniquely practical. A richly textured case study is used throughout the book. Although some aspects of the Airport Passenger Services business process are simplified for sake of clarity ……続きを見る
Data virtualization can help you accomplish your goals with more flexibility and agility. Learn what it is and how and why it should be used with Data Virtualization for Business Intelligence System……続きを見る
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forens……続きを見る
著者:Stephen E. Dossick
出版社: Editions Artisan Devereaux LLC
発売日: 2012年07月26日
How do you conquer the problem of scaling software development to hundreds or thousands of simultaneous workers using thousands or hundreds of thousands of project artifacts during the course of dev……続きを見る
Agiles Requirements Engineering hat sich in der Praxis bewährt. Im Vergleich zu nicht agilen Vorgehensweisen werden die an das Ergebnis gestellten Erwartungen nahezu immer erfüllt, wie das erste Kap……続きを見る
This is a compact Administrators Guide. It is friendly, and contains plenty of step-by-step instructions for installation and configuration of Zimbra as well as useful references and checklists. Adm……続きを見る
This seminal study explores the significant changes in the global IT industry as production has shifted from the developed world to massive sites in the developing world that house hundreds of thous……続きを見る