Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting Linux(R) Firewalls
Troubleshooting Linux(R) Firewalls

When something goes wrong with your Linux firewall, you need to fix itright now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes:...

Linux Network Administrator's Guide (2nd Edition)
Linux Network Administrator's Guide (2nd Edition)
This book was written to provide a single reference for network administration
in a Linux environment. Beginners and experienced users alike should find the
information they need to cover nearly all important administration activities
required to manage a Linux network configuration. The possible range of
topics to cover is
...
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
JNCIA: Juniper Networks Certified Internet Associate Study Guide
JNCIA: Juniper Networks Certified Internet Associate Study Guide

Here’s the book you need to prepare for the JNCIA exam JNO-201 from Juniper Networks. Written by a team of Juniper Networks trainers and engineers, this Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of official test objectives
  • Hundreds of...
The Great Firewall of China: How to Build and Control an Alternative Version of the Internet
The Great Firewall of China: How to Build and Control an Alternative Version of the Internet
Once little more than a glorified porn filter, China’s ‘Great Firewall’ has evolved into the most sophisticated system of online censorship in the world. Even as the Chinese internet grows and online businesses thrive, speech is controlled, dissent quashed, and any attempts to organize outside the official...
The Concise Guide to DNS and BIND
The Concise Guide to DNS and BIND
The Concise Guide to DNS and BIND provides the technical depth and expert-level information needed to understand and administer DNS and BIND. Domain Name System (DNS) is a distributed Internet directory service. It is used mainly to translate between domain names and IP addresses, and to control Internet email...
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Windows XP For Dummies, 2nd Edition
Windows XP For Dummies, 2nd Edition
Covers the latest Windows XP updates including Service Pack 2

Fully revised to quickly answer your XP questions

You asked for more coverage of Outlook Express, scanning and faxing, CD burning, and more in Windows XP For Dummies — and we delivered! This updated edition is packed with answers to your Windows XP questions, from...

CNET Do-It-Yourself Home Networking Projects
CNET Do-It-Yourself Home Networking Projects
You may be thinking that home networking is so ubiquitous there could not possibly be anything new or different to do with this interconnected marvel of now everyday technology. You can surf the Web on any of two to three PCs, upload and download photos, fill an MP3 player to the brim, and chat with your friends and family via IM—what more...
pfSense 2 Cookbook
pfSense 2 Cookbook

pfSense is an open source distribution of FreeBSD-based firewall which provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options which, compared to other offerings, makes determining requirements a little more difficult and a lot more important....

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy