• Information security book excerpts and reviews

    Visit the Information Security Bookshelf for book reviews and free chapter downloads.

    ITKE54,905 pointsBadges:
  • CISSP Essentials training: Domain 6, Application and System Development

    Applications and systems are the technologies closest to the data that information security professionals are constantly trying to protect.

    ITKE54,905 pointsBadges:
  • Hacking For Dummies: Chapter 7 — Passwords

    In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks.

    ITKE54,905 pointsBadges:
  • Java for S/390 and AS/400 COBOL Programmers

    This book is designed to help COBOL programmers make the jump to Java.

    ITKE54,905 pointsBadges:
  • Notes/Domino Security, An Administrator’s Guide: book review

    Read a review of the book Notes/Domino Security, An Administrators Guide, by Chuck Connell.

    searchdomino360 pointsBadges:
  • Understanding logging, log monitoring in ‘Hardening Linux’

    In Chapter 5, "Understanding Logging and Monitoring," Turnbull compares the syslog daemon to its more powerful and more secure successor, syslog-NG. He also shows readers the Simple Event Correlation tool for highlighting events in logs.

    ITKE54,905 pointsBadges:
  • Elements of API style: Daigneau talks REST vs SOAP

    Web services APIs have vastly expanded over the years to include a host of REST-based methods. Resource and Message APIs have become common in addition to SOAP APIs.

    ITKE54,905 pointsBadges:
  • Chapter 15 — Handling file uploads — of ‘Beginning PHP and MySQL 5′

    Chapter 15 -- Handling file uploads -- of 'Beginning PHP and MySQL 5' describes role of PHP's file-upload functions <is_uploaded_file() and move_uploaded_file() in the upload process. File-upload configuration directives, actual examples and code are offered, as well.

    ITKE54,905 pointsBadges:
  • Linux commands: Using Linux Survival Commands

    Use these Linux commands with VMware ESX Server, as described in this excerpt from Virtualization: From the Desktop to the Enterprise.

    ITKE54,905 pointsBadges:
  • Comparing Windows to Linux in Chapter 1 of “Linux Administration: A Beginner’s Guide”

    Read Chapter 1, "Technical Summary of Linux Distributions and Windows 2003," which deals with a history of Linux, explains the kernel and general terminology of Linux.

    ITKE54,905 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.