Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security) David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
CCIE Security Practice Labs (CCIE Self-Study)
The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...
Novell Cluster Services for Linux and NetWare (Novell Press)
Need to configure or manage Novell Cluster Services on NetWare, Linux or a mixed environment? Pick up a copy of the official reference guide, Novell Cluster Services for Linux and NetWare. This book blends in-depth information with practical, real world examples to cover cluster services configuration...
Building Embedded Linux Systems There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
Network Infrastructure Security Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... Optimizing Sales and Distribution in SAP ERP: Functionality and Configuration
Any company selling products or services must have the ability to efficiently fulfill
orders and deliver their products and services. An integrated sales and distribu
tion system enables them to create contracts and agreements, acknowledge order
receipt, fulfill orders, and provide accurate invoices. In today's competitive envi...
Perform accurate data analysis using the power of KNIME
Learn the essentials of KNIME, from importing data to data visualization and reporting
Utilize a wide range of data processing solutions
Visualize your final data sets using KNIME’s powerful data...
Hyper-V Replica Essentials
For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.
A practical step-by-step guide that goes beyond theory and...
Packet Filtering: Catching the Cool Packets
This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...
|Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 |