Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
CCNA Security Lab Manual
CCNA Security Lab Manual

The only authorized Lab Portfolio for the new Cisco Networking Academy CCNA Security Course

  • Gives CCNA Security students a comprehensive, printed and bound lab resource containing all of the course's labs, for use whenever Internet access isn't available
  • Handy printed...
Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Windows XP For Dummies, 2nd Edition
Windows XP For Dummies, 2nd Edition
Covers the latest Windows XP updates including Service Pack 2

Fully revised to quickly answer your XP questions

You asked for more coverage of Outlook Express, scanning and faxing, CD burning, and more in Windows XP For Dummies — and we delivered! This updated edition is packed with answers to your Windows XP questions, from...

CNET Do-It-Yourself Home Networking Projects
CNET Do-It-Yourself Home Networking Projects
You may be thinking that home networking is so ubiquitous there could not possibly be anything new or different to do with this interconnected marvel of now everyday technology. You can surf the Web on any of two to three PCs, upload and download photos, fill an MP3 player to the brim, and chat with your friends and family via IM—what more...
pfSense 2 Cookbook
pfSense 2 Cookbook

pfSense is an open source distribution of FreeBSD-based firewall which provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options which, compared to other offerings, makes determining requirements a little more difficult and a lot more important....

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy