 |
|
 Securing LINUX Step by StepThis guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,... |  |  |  |  Building a VoIP Network with Nortel's Multimedia Communication Server 5100This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network... |
|
 Hack Proofing Windows 2000 ServerEssential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include... |  |  Hack Proofing Your Web ApplicationsAs a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some... |  |  Open Source Security Tools: Practical Guide to Security Applications, A
Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.
Written with the harried IT manager in mind, Open Source Security Tools is a practical,... |
|
 Anti-Hacker Tool Kit, Third EditionTHWART THE LATEST DISASTROUS ATTACKS
Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the... |  |  Wireless Security: Models, Threats, and SolutionsREAL-WORLD WIRELESS SECURITY
This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to... |  |  Network Security: A Beginner's GuideLearn network security basics using this practical guide
Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to... |
|
 Microsoft Vista for IT Security ProfessionalsThis book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing... |  |  Configuring Juniper Networks NetScreen & SSG FirewallsJuniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.
Configuring... |  |  Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible... |
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 |