Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Building Internet Firewalls
Building Internet Firewalls

More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a...

Windows XP Networking
Windows XP Networking

Windows XP: practical solutions for working network administrators

Deploying, managing, or supporting networks with Windows XP clients? Here's all the information you need to maximize reliability, security, and performance... and minimize hassles and aggravation!...

Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Electronic Commerce (Networking Series)
Electronic Commerce (Networking Series)

The fourth edition of this best-selling title gives a complete overview of the electronic commerce environment. It has been revised and completely updated to reflect the most recent trends in e-commerce, including new material on security technologies, server options, enterprise applications, and investing online. Covering everything from...

Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques
Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques

Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world’s slickest and most elegant operating system, then this is the book for...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Cisco TCP/IP Routing Professional Reference
Cisco TCP/IP Routing Professional Reference

Updated and expanded to include the latest information on implementing TCP/IP over Cisco routers, this sought-after reference gives you just what Cisco documentation doesn't: crystal-clear, step-by-step instructions for every aspect of running TCP/IP on...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Cisco IOS Access Lists
Cisco IOS Access Lists
Cisco IOS Access Lists takes a methodical approach to access lists and their capabilities, and is ideal for administrators of Cisco equipment who have configured access lists before but feel as if they're not taking full advantage of their capabilities (which, author Jeff Sedayao proves, extend well beyond security). Much of what Sedayao...
The Best Damn Cisco Internetworking Book Period
The Best Damn Cisco Internetworking Book Period
Cisco is almost synonymous with networking.There is almost no area of networking in which
Cisco is not a key player, or is not making inroads.You name it Cisco makes it—routers, switches,
firewalls, management software, and so on. It can be quite an undertaking to locate and acquire
all of the information needed to configure,
...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy