Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Configuring Symantec AntiVirus Corporate Edition
Configuring Symantec AntiVirus Corporate Edition
At some time in the last 15 years many of us blinked, and upon opening our eyes
we found the world on the verge of becoming one large network. Public and
private networks were interconnected both far and near, and now in your corner
of this interconnected puzzle, virus protection for the network has become
your
...
Programming Lego Mindstorms with Java (With CD-ROM)
Programming Lego Mindstorms with Java (With CD-ROM)
Soon after its release, the LEGO MINDSTORMS Robotics Invention System (RIS) quickly became popular not only with its initial intended audience of children aged 11 and up, but also within a community of adult LEGO robotics enthusiasts that developed and spread worldwide with significant help from the Internet. Before long, hackers had deciphered the...
Hacking a Terror Network: The Silent Threat of Covert Channels
Hacking a Terror Network: The Silent Threat of Covert Channels
From a counterterrorism perspective, discovering terrorist communication networks
and methods is extremely important.Terrorists have demonstrated the
capability to exchange messages that vary from archaic (using human couriers)
to technologically advanced using “virtual dead-drops.”The popular press is full
of
...
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting
Security of corporate networks has become big business. Many companies are willing
to provide hardware, software, consulting, design, and implementation services.The
product space is vast, offering many different levels of products that claim to provide
all manner of solutions.The problem with the current state of the security space
...
How to Cheat at Managing Windows Small Business Server
How to Cheat at Managing Windows Small Business Server
You’re holding this book in your hands at the local bookstore, or maybe
viewing it online. Better yet, you’re sitting at your desk with a cup of coffee
looking at this foreword.You’re wondering if you bought the right book.

You’re probably expecting to find some serious shortcuts to managing...
Wireless Hacking: Projects for Wi-Fi Enthusiasts
Wireless Hacking: Projects for Wi-Fi Enthusiasts

Welcome to the world of “wireless magic.” 802.11 (Wi-Fi) wireless LANs have exploded onto the scene with an excitement not seen since the introduction of the Internet itself. Getting rid of the wires means getting rid of the hassle.With Wi-Fi, you can roam through your favorite coffee shop, boardroom or living room, all the while...

Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
As “techies,” we embrace the ability to understand the technology behind how
and why things work, to a point beyond most other people’s interest. Usually
what drives our interest is curiosity, a curiosity very similar to that which we
experienced in childhood.

Curiosity comes in different shapes and sizes
...
Configuring Sonicwall Firewalls
Configuring Sonicwall Firewalls
Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s security.
The risks today have greatly increased, so the call for a stronger breed of firewall
has been made. In the past, simple packet-filtering firewalls allowing
...
Stealing the Network: How to Own a Continent
Stealing the Network: How to Own a Continent
This book outlines a fictional plot to "own the box" by compromising an entire continent's network infrastructure. It combines a set of stories with real technology to show readers the danger that lurks in the shadows of the information security industry.

The first book in this series ...

Sniffer Pro Network Optimization and Troubleshooting Handbook
Sniffer Pro Network Optimization and Troubleshooting Handbook
Imagine it is 4:00 P.M. and you are sitting at your desk with three books spread
across your lap.You are hard at work trying to figure out why performance on
your company’s file server has dropped sharply over the past eight hours. Of the
200 users in your company, nearly 100 of them have called to complain about
slow
...
The Best Damn Cisco Internetworking Book Period
The Best Damn Cisco Internetworking Book Period
Cisco is almost synonymous with networking.There is almost no area of networking in which
Cisco is not a key player, or is not making inroads.You name it Cisco makes it—routers, switches,
firewalls, management software, and so on. It can be quite an undertaking to locate and acquire
all of the information needed to configure,
...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy