Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

The Last Vampire
The Last Vampire

I am a vampire, and that is the truth. But the modern meaning of the word vampire, the stories that have been told about creatures such as I, are not precisely true. I do not turn to ash in the sun, nor do I cringe when I see a crucifix. I wear a tiny gold cross now around my neck, but only because I like it. I cannot command a pack of wolves...

Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))

This volume contains the proceedings of the 8th International PhD Student Workshop on Service Life and Durability of Reinforced Concrete Structures that was held in Marne-la-Vallée, France, on September the 26th and 27th 2016.

Topics discussed in the book are related to durability performance of reinforced...

Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Why We Fight: One Man's Search for Meaning Inside the Ring
Why We Fight: One Man's Search for Meaning Inside the Ring

A physical and philosophical mediation on why we are drawn to fight each other for sport, what happens to our bodies and brains when we do, and what it all means

Anyone with guts or madness in him can get hit by someone who knows how; it takes a different kind of madness, a more persistent
...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy