eBooks-it.org Logo
eBooks-IT.org Inner Image

Mar 16 2015 Added eBooks Page 2

Download free Mar 16 2015 Added eBooks Page 2

Nmap Cookbook

The Fat-free Guide to Network Scanning
Nmap Cookbook Image
Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results. Topics covered include: * Installation on Windows, Mac OS X, Unix/Linux platforms * Basic and advanced scanning techniques * Network inventory and security auditing * Firewall evasion techniques * Zenmap - A graphical front-end for Nmap * NSE - The Nmap Scripting Engine * Ndiff - A Nmap scan comparison utility Simplified coverage of Nmap 5.00 features....

Security in Computing

Security in Computing Image
5th Edition
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today's newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing...

Practical Hadoop Security

Practical Hadoop Security Image
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoopdeployment whowant to secure their Hadoop clusters.A detailed guide to thesecurity options and configurationwithin Hadoop itself, author BhushanLakhe takes you through a comprehensive studyof how to implement defined security within a Hadoop cluster in a hands-on way. You will start witha detailed overview of all the security options available for Hadoop, includingpopular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples)with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and trac...

Windows PowerShell Desired State Configuration Revealed

Windows PowerShell Desired State Configuration Revealed Image
Desired State Configuration (DSC) is a powerful new configuration management platform that makes it easier than ever to perform cross-platform configuration management of your infrastructure, whether on-premise or in the cloud. DSC provides the management platform and Application Programming Interface (API) that can be used with any programming language. Windows PowerShell Desired State Configuration Revealed will take you through this new technology from start to finish and demonstrates the DSC interfaces through Windows PowerShell.DSC allows you to manage target devices by simply declaring what state you want them to be in, using new declarative language extensions, rather than writing detailed instructions to get them into that state. This makes c...

Elasticsearch

The Definitive Guide
Elasticsearch Image
Whether you need full-text search or real-time analytics of structured data-or both-the Elasticsearch distributed search engine is an ideal way to put your data to work. This practical guide not only shows you how to search, analyze, and explore data with Elasticsearch, but also helps you deal with the complexities of human language, geolocation, and relationships.If you';re a newcomer to both search and distributed systems, you';ll quickly learn how to integrate Elasticsearch into your application. More experienced users will pick up lots of advanced techniques. Throughout the book, you';ll follow a problem-based approach to learn why, when, and how to use Elasticsearch features.Understand how Elasticsearch interprets data in your documentsIndex and...


2007 - 2017 © eBooks-IT.org