|
|
|
|
| | Mission Critical Internet SecurityThe best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This... | | Privacy Defended: Protecting Yourself OnlinePrivacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical... |
|
|
How to Cheat at Configuring Open Source Security ToolsThe Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and... | | How to Do Everything with Windows XPGet the most out of Windows XP using this friendly, solutions-oriented guide. See how much you can do with the world’s most popular operating system--including making movies and playing music--and learn about all its new updates such as networking for both home and office, faster boot features, better security, and improved Web browsing.... | | Learning OpenVPN 2.0.9OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL... |
|
Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | | | Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |