Thor s Microsoft Security Bible Book
Score: 4
From 1 Ratings

Thor s Microsoft Security Bible


  • Author : Timothy "Thor" Mullen
  • Publisher : Elsevier
  • Release Date : 2011-07-16
  • Genre: Computers
  • Pages : 336
  • ISBN 10 : 9781597495738

GET BOOK
Thor s Microsoft Security Bible Excerpt :

Thor’s Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Named the 2011 Best Systems Administration Book by InfoSec Reviews Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so

Thor s Microsoft Security Bible Book

Thor s Microsoft Security Bible


  • Author : Timothy M. Mullen
  • Publisher : Elsevier
  • Release Date : 2011
  • Genre: Computers
  • Pages : 315
  • ISBN 10 : 9781597495721

GET BOOK
Thor s Microsoft Security Bible Excerpt :

Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials

Thor s OS Xodus Book

Thor s OS Xodus


  • Author : Timothy "Thor" Mullen
  • Publisher : Newnes
  • Release Date : 2015-10-28
  • Genre: Computers
  • Pages : 218
  • ISBN 10 : 9780124105065

GET BOOK
Thor s OS Xodus Excerpt :

Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix. Provides the best way to migrate from Microsoft products to OSX with information found in no other text The most complete roadmap for entities who want to move away from Microsoft and decouple their dependency on Microsoft products Authored by Thor Mullen, Principal Security Architect for a multi-billion dollar commerce platform, who teaches users how to create a secure OSX installation Unique resource that provides valuable information on moving from IIS to Apache, from MS SQL Server to MySQL, from .NET to PHP

The Security Leader   s Communication Playbook Book

The Security Leader s Communication Playbook


  • Author : Jeffrey W. Brown
  • Publisher : CRC Press
  • Release Date : 2021-09-12
  • Genre: Business & Economics
  • Pages : 394
  • ISBN 10 : 9781000440270

GET BOOK
The Security Leader s Communication Playbook Excerpt :

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a “communication theory” book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

Network Security Bible Book
Score: 3.5
From 2 Ratings

Network Security Bible


  • Author : Eric Cole
  • Publisher : John Wiley & Sons
  • Release Date : 2011-03-31
  • Genre: Computers
  • Pages : 936
  • ISBN 10 : 9780470570005

GET BOOK
Network Security Bible Excerpt :

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security. Covers all core areas of network security and how they interrelate Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide Examines new trends and best practices in use by organizations to secure their enterprises Features additional chapters on areas related to data protection/correlation and forensics Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know.

The Path of Daggers Book
Score: 3.5
From 50 Ratings

The Path of Daggers


  • Author : Robert Jordan
  • Publisher : Tor Books
  • Release Date : 2010-05-18
  • Genre: Fiction
  • Pages : 608
  • ISBN 10 : 9781429960595

GET BOOK
The Path of Daggers Excerpt :

The Wheel of Time is now an original series on Prime Video, starring Rosamund Pike as Moiraine! Since its debut in 1990, The Wheel of Time® by Robert Jordan has captivated millions of readers around the globe with its scope, originality, and compelling characters. The Wheel of Time turns and Ages come and go, leaving memories that become legend. Legend fades to myth, and even myth is long forgotten when the Age that gave it birth returns again. In the Third Age, an Age of Prophecy, the World and Time themselves hang in the balance. What was, what will be, and what is, may yet fall under the Shadow. The Seanchan invasion force is in possession of Ebou Dar. Nynaeve, Elayne, and Aviendha head for Caemlyn and Elayne's rightful throne, but on the way they discover an enemy much worse than the Seanchan. In Illian, Rand vows to throw the Seanchan back as he did once before. But signs of madness are appearing among the Asha'man. In Ghealdan, Perrin faces the intrigues of Whitecloaks, Seanchan invaders, the scattered Shaido Aiel, and the Prophet himself. Perrin's beloved wife, Faile, may pay with her life, and Perrin himself may have to destroy his soul to save her. Meanwhile the rebel Aes Sedai under their young Amyrlin, Egwene al'Vere, face an army that intends to keep them away from the White Tower. But Egwene is determined to unseat the usurper Elaida and reunite the Aes Sedai. She does not yet understand the price that others--and she herself--will pay. The Wheel of Time® New Spring: The Novel #1 The Eye of the World #2 The Great Hunt #3 The Dragon Reborn #4 The Shadow Rising #5 The Fires of Heaven #6 Lord of Chaos #7 A Crown of Swords #8 The Path of Daggers #9 Winter's Heart #10 Crossroads of Twilight #11 Knife of Dreams By Robert Jordan and Brandon Sanderson #12 The Gathering Storm #13 Towers of Midnight #14 A Memory of Light By Robert Jordan and Teresa Patterson The World of Robert Jordan's The Wheel of Time By Robert Jordan, Harriet McDougal, Alan Romanczuk, and M

Dr  Tom Shinder s Configuring ISA Server 2004 Book
Score: 5
From 2 Ratings

Dr Tom Shinder s Configuring ISA Server 2004


  • Author : Debra Littlejohn Shinder
  • Publisher : Elsevier
  • Release Date : 2004-12-31
  • Genre: Computers
  • Pages : 608
  • ISBN 10 : 0080477402

GET BOOK
Dr Tom Shinder s Configuring ISA Server 2004 Excerpt :

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market. * This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations. * Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities. * Learn how to take advantage of ISA Server 2004's new VPN capabilities!

Windows PowerShell 2 0 Bible Book
Score: 5
From 1 Ratings

Windows PowerShell 2 0 Bible


  • Author : Thomas Lee
  • Publisher : John Wiley & Sons
  • Release Date : 2011-09-26
  • Genre: Computers
  • Pages : 696
  • ISBN 10 : 9781118183281

GET BOOK
Windows PowerShell 2 0 Bible Excerpt :

Here's the complete guide to Windows PowerShell 2.0 foradministrators and developers Windows PowerShell is Microsoft's next-generation scripting andautomation language. This comprehensive volume provides thebackground that IT administrators and developers need in order tostart using PowerShell automation in exciting new ways. It explainswhat PowerShell is, how to use the language, and specific ways toapply PowerShell in various technologies. Windows PowerShell is Microsoft's standard automation tool andsomething that every Windows administrator will eventually have tounderstand; this book provides the background necessary to applyPowerShell automation. Covers how to use the language and specific ways to applyPowerShell in a variety of scenarios Addresses new features in the latest version of PowerShell andthe additional functionality delivered by new products that providedirect or indirect ways to use PowerShell for scripting andautomation purposes Explores the language fundamentals and how to use PowerShellfor desktop, server, server application, and virtualization/cloudsituations This thorough guide goes well beyond theory to offer real-worldinformation and new scripting techniques, enabling administratorsand developers to make the most of PowerShell 2.0.

Idea Man Book
Score: 2
From 3 Ratings

Idea Man


  • Author : Paul Allen
  • Publisher : Penguin
  • Release Date : 2011-04-19
  • Genre: Biography & Autobiography
  • Pages : 384
  • ISBN 10 : 9781101476451

GET BOOK
Idea Man Excerpt :

By his early thirties, Paul Allen was a world-famous billionaire-and that was just the beginning. In 2007 and 2008, Time named Paul Allen, the cofounder of Microsoft, one of the hundred most influential people in the world. Since he made his fortune, his impact has been felt in science, technology, business, medicine, sports, music, and philanthropy. His passion, curiosity, and intellectual rigor-combined with the resources to launch and support new initiatives-have literally changed the world. In 2009 Allen discovered that he had lymphoma, lending urgency to his desire to share his story for the first time. In this classic memoir, Allen explains how he has solved problems, what he's learned from his many endeavors-both the triumphs and the failures-and his compelling vision for the future. He reflects candidly on an extraordinary life. The book also features previously untold stories about everything from the true origins of Microsoft to Allen's role in the dawn of private space travel (with SpaceShipOne) and in discoveries at the frontiers of brain science. With honesty, humor, and insight, Allen tells the story of a life of ideas made real.

Complete A  Guide to IT Hardware and Software Book

Complete A Guide to IT Hardware and Software


  • Author : Cheryl A. Schmidt
  • Publisher : Pearson IT Certification
  • Release Date : 2019-07-29
  • Genre: Computers
  • Pages : 1280
  • ISBN 10 : 9780135291535

GET BOOK
Complete A Guide to IT Hardware and Software Excerpt :

Master IT hardware and software installation, configuration, repair, maintenance, and troubleshooting and fully prepare for the CompTIA® A+ Core 1 (220-1001) and Core 2 (220-1002) exams. This is your all-in-one, real-world, full-color guide to connecting, managing, and troubleshooting modern devices and systems in authentic IT scenarios. Its thorough instruction built on the CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) exam objectives includes coverage of Windows 10, Mac, Linux, Chrome OS, Android, iOS, cloud-based software, mobile and IoT devices, security, Active Directory, scripting, and other modern techniques and best practices for IT management. Award-winning instructor Cheryl Schmidt also addresses widely-used legacy technologies—making this the definitive resource for mastering the tools and technologies you’ll encounter in real IT and business environments. Schmidt’s emphasis on both technical and soft skills will help you rapidly become a well-qualified, professional, and customer-friendly technician. LEARN MORE QUICKLY AND THOROUGHLY WITH THESE STUDY AND REVIEW TOOLS: Learning Objectives and chapter opening lists of CompTIA A+ Certification Exam Objectives make sure you know exactly what you’ll be learning, and you cover all you need to know Hundreds of photos, figures, and tables present information in a visually compelling full-color design Practical Tech Tips provide real-world IT tech support knowledge Soft Skills best-practice advice and team-building activities in every chapter cover key tools and skills for becoming a professional, customer-friendly technician Review Questions—including true/false, multiple choice, matching, fill-in-the-blank, and open-ended questions—carefully assess your knowledge of each learning objective Thought-provoking activities help students apply and reinforce chapter content, and allow instructors to “flip” the classroom if they choose Key Terms identify exam words and phrases associated with each

The Lost Gate Book
Score: 3.5
From 75 Ratings

The Lost Gate


  • Author : Orson Scott Card
  • Publisher : Tor Books
  • Release Date : 2011-01-04
  • Genre: Fiction
  • Pages : 384
  • ISBN 10 : 9781429993418

GET BOOK
The Lost Gate Excerpt :

Orson Scott Card's The Lost Gate is the first book in the Mithermages series from the New York Times bestselling author of Ender's Game. Danny North knew from early childhood that his family was different, and that he was different from them. While his cousins were learning how to create the things that commoners called fairies, ghosts, golems, trolls, werewolves, and other such miracles that were the heritage of the North family, Danny worried that he would never show a talent, never form an outself. He grew up in the rambling old house, filled with dozens of cousins, and aunts and uncles, all ruled by his father. Their home was isolated in the mountains of western Virginia, far from town, far from schools, far from other people. There are many secrets in the House, and many rules that Danny must follow. There is a secret library with only a few dozen books, and none of them in English — but Danny and his cousins are expected to become fluent in the language of the books. While Danny's cousins are free to create magic whenever they like, they must never do it where outsiders might see. Unfortunately, there are some secrets kept from Danny as well. And that will lead to disaster for the North family. The Mithermages series The Lost Gate The Gate Thief Gatefather At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.

Towers of Midnight Book
Score: 4
From 98 Ratings

Towers of Midnight


  • Author : Robert Jordan
  • Publisher : Tor Books
  • Release Date : 2011-01-31
  • Genre: Fiction
  • Pages : 864
  • ISBN 10 : 9781429960632

GET BOOK
Towers of Midnight Excerpt :

The Wheel of Time ® is a PBS Great American Read Selection! Now in development for TV! Since its debut in 1990, The Wheel of Time® by Robert Jordan has captivated millions of readers around the globe with its scope, originality, and compelling characters. In Towers of Midnight, the Last Battle has started. The seals on the Dark One's prison are crumbling. The Pattern itself is unraveling, and the armies of the Shadow have begun to boil out of the Blight. The sun has begun to set upon the Third Age. Perrin Aybara is now hunted by specters from his past: Whitecloaks, a slayer of wolves, and the responsibilities of leadership. All the while, an unseen foe is slowly pulling a noose tight around his neck. To prevail, he must seek answers in Tel'aran'rhiod and find a way--at long last--to master the wolf within him or lose himself to it forever. Meanwhile, Matrim Cauthon prepares for the most difficult challenge of his life. The creatures beyond the stone gateways--the Aelfinn and the Eelfinn--have confused him, taunted him, and left him hanged, his memory stuffed with bits and pieces of other men's lives. He had hoped that his last confrontation with them would be the end of it, but the Wheel weaves as the Wheel wills. The time is coming when he will again have to dance with the Snakes and the Foxes, playing a game that cannot be won. The Tower of Ghenjei awaits, and its secrets will reveal the fate of a friend long lost. Dovie'andi se tovya sagain. It's time to toss the dice. TV series update: "Sony will produce along with Red Eagle Entertainment and Radar Pictures. Rafe Judkins is attached to write and executive produce. Judkins previously worked on shows such as ABC’s “Agents of SHIELD,” the Netflix series “Hemlock Grove,” and the NBC series “Chuck.” Red Eagle partners Rick Selvage and Larry Mondragon will executive produce along with Radar’s Ted Field and Mike Weber. Darren Lemke will also executive produce, with Jordan’s widow Harriet McDougal se

Microsoft Virtualization Book

Microsoft Virtualization


  • Author : Thomas Olzak
  • Publisher : Syngress
  • Release Date : 2010-06-04
  • Genre: Computers
  • Pages : 512
  • ISBN 10 : 1597494895

GET BOOK
Microsoft Virtualization Excerpt :

Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a fresh virtualization environment. Readers walk through step-by-step instructions on everything from building a Windows 2008 server to installing and configuring Hyper-V and App-V. The book begins with the basics of virtualization, including the role of virtualization in the changing landscape of the traditional data center and its benefits, and the strategies of virtualization. It presents the step-by-step process used to build a Windows 2008 server and the process of configuring and managing a Hyper-V infrastructure. Microsoft's approach to high availability and the combination of Microsoft tools to provide a very reliable and highly available virtualization infrastructure are discussed. The chapters also cover the migration of physical servers to virtual servers; the Dynamic Data Center concept; creating and publishing a virtual application within App-V; and desktop virtualization. This book was intended for seasoned system administrators and engineers who grew up in and still manage primarily a hardware-based server environment containing a large assortment of both newer and legacy applications. Covers Microsoft virtualization products completely, including Hyper-V Includes a special section on securing virtual infrastructure Gives hands-on instructions to help understand and implement Microsoft solutions

The Brothers Karamazov Book
Score: 4
From 122 Ratings

The Brothers Karamazov


  • Author : Fyodor Dostoevsky
  • Publisher : Graphic Arts Books
  • Release Date : 2020-10-06
  • Genre: Fiction
  • Pages : 890
  • ISBN 10 : 9781513268217

GET BOOK
The Brothers Karamazov Excerpt :

Three brothers and their relations in 19th century Russia provide the base for a sweeping epic overview of human striving, folly and hope. First published in 1880, The Brothers Karamazov is a landmark work in every respect. Revolving around shiftless father Fyodor Pavlovich Karamazov are the fates of his three sons, each of whom has fortunes entwined with the others. The eldest son, Dimitri, seeks an inheritance from his father and becomes his rival in love. Ivan, the second son, is so at odds with the world that he is driven near to madness, while the youngest, Alexi, is a man of faith and a natural optimist. These personalities are drawn out and tested in a crucible of conflict and emotion as the author forces upon them fundamental questions of morality, faith, reason and responsibility. This charged situation is pushed to its limit by the addition of the unthinkable, murder and possible patricide. Using shifting viewpoints and delving into the minds of his characters, Dostoevsky adopted fresh techniques to tell his wide-reaching story with power and startling effectiveness. The Brothers Karamazov remains one of the most respected and celebrated novels in all literature and continues to reward readers beyond expectation. With an eye-catching new cover, and professionally typeset manuscript, this edition of The Brothers Karamazov is both modern and readable.

Securing Windows Server 2008 Book

Securing Windows Server 2008


  • Author : Aaron Tiensivu
  • Publisher : Syngress
  • Release Date : 2008-07-01
  • Genre: Computers
  • Pages : 656
  • ISBN 10 : 0080569978

GET BOOK
Securing Windows Server 2008 Excerpt :

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack. As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network. 2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network. 3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur. 4. Protection against malicious s