 |
|
 Network Security Hacks: Tips & Tools for Protecting Your PrivacyIn the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and... |  |  Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... |  |  Planning for Survivable NetworksKeep your network safe from security disasters with a dependable recovery strategy
Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.
In the information-packed pages of this book, Annlee Hines shares her... |
|
 Network Intrusion Detection (3rd Edition)Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the... |  |  Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... |  |  Testing Web Security: Assessing the Security of Web Sites and ApplicationsProtect your company’s Web site from hack attacks with this guide to proven security-testing techniques
It’s only a matter of time before an unscrupulous would-be intruder decides to attack your organization’s Web site. If they’re successful, you could lose confidential customer information, intellectual property, or... |
|
 Configuring Juniper Networks NetScreen & SSG FirewallsJuniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.
Configuring... |  |  Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible... |  |  Microsoft Vista for IT Security ProfessionalsThis book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing... |
|
|
| Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |