Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

PRINCE2 Study Guide: 2017 Update
PRINCE2 Study Guide: 2017 Update

Everything you need to pass the PRINCE2 with flying colors

The PRINCE2 Study Guide, Second Edition, offers comprehensive preparation for the latest PRINCE2 exam. Covering 100 percent of the exam objectives, this guide provides invaluable guidance that will help you master both the material and its applications;...

Using Docker: Developing and Deploying Software with Containers
Using Docker: Developing and Deploying Software with Containers

Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Network Security Architectures
Network Security Architectures

Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to...

Result Page: 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy