Advanced Penetration Testing for Highly-Secured EnvironmentsAdvanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab.
You'll learn how to clean up and compile proof of concept, exploit code from the web, advanced web application testing techniques, client side attacks, post exploitation strategies, detection avoidance methods, generation of well defined reports and metrics, and setting up a penetration testing virtual lab that mimics a secured environment. ...
WordPress 3 CookbookUsing the WordPress Content Management System, you can create a beautiful, dynamic, and amazing website. WordPress is a flexible and powerful tool that's ideal for creating both blog and non-blog websites. Are you feeling limited with WordPress, or are you wondering how popular blogs do a certain kind of thing that you can't?
WordPress 3 Cookbook focuses on providing solutions to common WordPress problems so that you can translate your site to one of the best. The author's experience with WordPress enables him to share insights on using WordPress effectively, in a clear and friendly way, giving practical hands-on solutions to WordPress problems, questions, and common tasks - from themes to widgets and from SEO to security. ...
DotNetNuke 5.4 CookbookDotNetNuke is a powerful and flexible content management system for building websites. It comes with many features for publishing content including tools to create Blogs, Banner Advertising, News Feeds, and much more. But setting up a fully featured website and customizing a complete content management system using the open source DotNetNuke package can be challenging. There are multiple pieces involved and each piece must be correct for the whole to work.
The recipes in this book will safely navigate you around the obstacles and have your own full-featured website using the DotNetNuke CMS with blogs, forums, wikis, user security, and much more up and running in no time. This book will also help you to build your own custom modules using VB.Net and restyle them with your own custom skins. ...
Microsoft SQL Server 2008 Management and AdministrationIf you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based reference you've been searching for. Authored by a world-class expert on SQL Server in the enterprise, this book goes far beyond the basics, taking on the complex tasks that DBAs need to make the most of Microsoft's flagship database platform. SQL Server MVP, Ross Mistry presents proven techniques for SQL Server 2008 installation, upgrades, backup/restore, data transfer, indexing, high availability, security, and much more. He draws on extensive testing in high-profile production environments to offer step-by-step solutions and powerful tips you won't find anywhere else. ...
AspectJ in ActionA software system is the realization of a set of concerns. One of the central premises of object-oriented programming is that each concern should be implemented as a separate module. However, there are certain system-wide concerns, such as logging, security, performance, and so forth, that often need to be addressed in many, if not all of the modules. Consequently, the code to handle these system-wide concerns may be mixed in with the core logic of a huge number of modules, resulting in lower productivity, poor quality, and systems that are hard to evolve.
Aspect-oriented programming overcomes these problems by modularizing the system-wide concerns. ...
Spring in PracticeSpring in Practice covers 66 Spring development techniques and the practical issues you will encounter when using them. The book starts with three carefully crafted introductory chapters to get you up to speed on the fundamentals. And then, the core of the book takes you step-by-step through the important, practical techniques you will use no matter what type of application you're building. You'll hone your Spring skills with examples on user accounts, security, NoSQL data stores, and application integration. Along the way, you'll explore Spring-based approaches to domain-specific challenges like CRM, configuration management, and site reliability. ...
70-411 Administering Windows Server 2012This 70-411 Administering Windows Server 2012 textbook covers the second of three exams required for Microsoft Certified Solutions Associate (MCSA): Windows Server 2012 certification. This course will help validate the skills and knowledge necessary to administer a Windows Server 2012 Infrastructure in an enterprise environment. The three MCSA exams collectively validate the skills and knowledge necessary for implementing, managing, maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment. This Microsoft Official Academic Course is mapped to the 70-411 Administering Windows Server 2012 exam objectives. This textbook focuses on real skills for real jobs and prepares students to prove mastery of core services such as user and group management, network access, and data security. ...
Word 2013 BibleIf you want to use Microsoft Word to create more than just simple documents, start with this ultimate Word guide. Packed with the in-depth content that is the hallmark of all Wiley Bibles, this book covers it all. You'll first find out what's new in Word 2013 on the features level - formatting, styles, tables, and more - before you dive into the big stuff that can help you become more efficient. From document design to creating master documents to applying security to collaborating in the Cloud, you'll learn not just how to do tasks, but the best ways to do them, and why. ...
802.11ac: A Survival GuideThe next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.
Author Matthew Gast-an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance—explains how 802.11ac will not only increase the speed of your network, but its capacity as well. Whether you need to serve more clients with your current level of throughput, or serve your existing client load with higher throughput, 802.11ac is the solution. This book gets you started. ...
Zenoss Core Network and System MonitoringFor system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic. At some point it will be necessary to read the network traffic directly instead of monitoring application level details. Network security audits, debug network configurations, and usage patterns analyzing can all require network traffic monitoring. This task can be achieved by using network monitoring software, or network sniffers, that sniff the traffic and display it on your computer on the network.
Zenoss is an enterprise network and systems management application written in Python/Zope that provides an integrated product for monitoring availability, performance, events and configuration across layers and across platforms. ...