Home | Amazing | Today | Tags | Publishers | Years | Search 
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Networking All-in-One Desk Reference for Dummies
Networking All-in-One Desk Reference for Dummies
9 books in 1– your key to networking success!

Your one-stop guide to building, securing, and administering networks large and small

So you’re in charge of the network? No worries! This handy all-in-one guide provides a bird’s-eye view of all the important stuff, like installing and configuring various network...

Special Edition Using Linux System Administration (Special Edition Using)
Special Edition Using Linux System Administration (Special Edition Using)
Special Edition Using Linux Administration is the complete, comprehensive reference book for the experienced administrator who needs to learn to run a Linux system and successfully manage it. This book has a great appeal to those administrators whose knowledge is limited to Windows or NetWare networks as they integrate Linux into their...
Ubuntu: The Complete Reference (Complete Reference Series)
Ubuntu: The Complete Reference (Complete Reference Series)

The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS

Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up...

CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Windows XP Unleashed
Windows XP Unleashed
Windows XP Unleashed guides the advanced reader through nearly every Windows XP topic imaginable giving ideas and solutions practical to typical problems encountered by professionals. Examples of topics covered are:

* Installations, use, and maintenance;
* Performance tuning;
* Optimizing memory;
* Detailed registry
...

Sams Teach Yourself Microsoft Windows XP in 21 Days
Sams Teach Yourself Microsoft Windows XP in 21 Days
John guides the reader through the new and unfamiliar Windows interface, while introducing the new features. The book provides information in several formats, all integrated with theory, tutorials, procedures, tips and comprehensive.

Topics range from:* Installation of Windows XP* Whether to upgrade and if so, how to do it* Configuring services...

SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy