||Anti-Hacker Tool Kit, 4th Edition|
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. ...
Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions demonstrates each topic through a start-to-finish, illustrated case study. The book includes financial, technology, governance, and legal use cases along with advantages and challenges. Validation, implementation, troubleshooting, and best practices are fully covered. You will learn, step-by-step, how to build and maintain effective, reliable, and transparent blockchain solutions.
Understand the fundamentals of decentralized computing and blockchain; Explore business, technology, governance, and legal use cases; Review the evolving practice of law and technology as it concerns legal and governance issues arising from blockchain implementation; Write and administer performant blockchain-enabled applications; Handle cryptograp ...
||Oracle Database 12c Release 2 Real Application Clusters Handbook|
Through clear instruction and detailed examples, Oracle Database 12c Real Application Clusters Handbook: Concepts, Administration, Tuning & Troubleshooting teaches how to build, configure, and maintain a dynamic enterprise computing infrastructure. This thoroughly revised edition covers best uses for the latest tools and features - all from the practical standpoint of a working DBA.
You will discover how to prepare hardware, configure the software, optimize data integrity, and integrate seamless failover protection. Brand-new flex and large cluster technologies are explained in full detail, and readers will get complete solutions for securing data and continuing business operations in the event of hardware failure.
Presents all the new information needed to effectively use Oracle Real Application Clusters 12c -considered the most radical overhaul ever. Offers detailed coverage of troubleshooting, performance tuning, and application development. ...
||Quicken for Windows, Eighth Edition|
Take control of your personal finances using the best practices and time-saving tips in Quicken 2018 for Windows The Official Guide! Find out the most effective methods for tracking your income, expenses, savings, transactions, investments, and so much more.
Endorsed by the makers of Quicken, this practical resource shows you, step by step, how to take full advantage of the software's powerful features, including the Quicken mobile app. You'll also get professional advice to help you reduce debt, stay on budget, save money, invest wisely, and plan for a secure financial future.
Customize Quicken for your preferences; Track income and expenses; Automate transactions and tasks; Record bank and credit card transactions; Use online banking features; Reconcile checking, savings, and credit card accounts; Track investments and optimize your portfolio; Monitor your assets, loans, and net worth; Evaluate your financial position; Reduce debt, save money, and plan for retirement; Simplify ...
||CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001)|
This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CySA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference. ...
||Java: A Beginner's Guide, 7th Edition|
Fully updated for Java Platform, Standard Edition 9 (Java SE 9), Java: A Beginner's Guide, 7th Edition, gets you started programming in Java right away. Bestselling programming author Herb Schildt begins with the basics, such as how to create, compile, and run a Java program. He then moves on to the keywords, syntax, and constructs that form the core of the Java language. The book also covers some of Java's more advanced features, including multithreaded programming, generics, lambda expressions, Swing, and JavaFX. This practical Oracle Press guide features details on Java SE 9's innovative new module system, and, as an added bonus, it includes an introduction to JShell, Java's new interactive programming tool.
Designed for Easy Learning: Key Skills and Concepts - Chapter-opening lists of specific skills covered in the chapter; Ask the Expert - Q&A sections filled with bonus information and helpful tips; Try This - Hands-on exercises that show you how to apply your skills Self Tests ...
||Java: The Complete Reference, 10th edition|
Fully updated for Java SE 9, Java: The Complete Reference, 10th Edition explains how to develop, compile, debug, and run Java programs. Bestselling programming author Herb Schildt covers the entire Java language, including its syntax, keywords, and fundamental programming principles. You'll also find information on key portions of the Java API library, such as I/O, the Collections Framework, the stream library, and the concurrency utilities. Swing, JavaFX, JavaBeans, and servlets are examined and numerous examples demonstrate Java in action. Of course, the new module system added by Java SE 9 is discussed in detail. This Oracle Press resource also offers an introduction to JShell, Java's new interactive programming tool. ...
||Plug-In PHP: 100 Power Solutions|
This practical guide gives you 100 ready-to-run PHP functions for solving most of the main problems you encounter when building a dynamic website with PHP. Every plug-in in the book offers a complete and working solution for a result you can achieve right away, using ready-made code you simply drop into your own program. And there's little or no learning curve, because each one is self-contained and thoroughly documented. ...
||Hacking Exposed Mobile|
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained.
Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. ...
||Information Security The Complete Reference, 2nd Edition|
Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, 2nd Edition is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.
Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure applicat ...
||Gray Hat Hacking, 3rd Edition|
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering. ...