|
|
|
|
Network Security Assessment: From Vulnerability to PatchThis book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.
This is unique in that it details both the management and technical skill and tools... | | | | |
|
|
|
The Tao of Network Security Monitoring : Beyond Intrusion DetectionEvery network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?
... | | The J2EE TutorialYou're familiar with Java™ programming, but now it's time for you to take it to the next level and begin creating enterprise applications with the Java™ 2 Platform, Enterprise Edition (J2EE™). The J2EE™ Tutorial is the hands-on, example-driven guide that offers unparalleled technical guidance... | | IP Routing FundamentalsA comprehensive ntroduction to routing concepts and protocols in IP networks.
- Comprehensive review of the operational mechanics of today's leading routing protocols, including IGRP, EIGRP, OSPF, RIP, and RIP-2
- Detailed explanation of IP addressing, including classful and classless addresses, subnetting,...
|
|
|
Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 |