Information Security: The Complete Reference, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Develop and implement an effective end-to-end security program
Today’s complex world of mobile platforms, cloud...
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.
If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...
Practical Linux Security Cookbook
This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
Enhance file system security and local and remote
Practical Linux Infrastructure
Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.
Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
Explore the insights and importance of testing your corporate network systems before the hackers strike
ScreenOS Cookbook Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...
Red Hat Linux Bible: Fedora and Enterprise Edition Use this comprehensive guide to harness the power of Red Hat Linux on a server, desktop, or laptop computer. Coverage includes desktop and server basics, simple, painless installations, Linux Shell, using VmWare, VNC, and more.
If Red Hat Linux can do it, you can do it too…
With Red Hat Linux separating into the open source...
|Result Page: 25 24 23 22 21 20 19 18 17 16 |