|
|
|
|
Linux Firewalls (3rd Edition)An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most... | | CompTIA Network+ All-in-One Exam Guide, Fourth EditionAll-in-One is All You Need
Get complete coverage of all the material included on the latest release of the CompTIA Network+ exam inside this fully updated, comprehensive resource. Written by CompTIA certification and training expert Mike Meyers, this authoritative exam guide features learning objectives at the beginning of each... | | Red Hat Linux Bible: Fedora and Enterprise EditionUse this comprehensive guide to harness the power of Red Hat Linux on a server, desktop, or laptop computer. Coverage includes desktop and server basics, simple, painless installations, Linux Shell, using VmWare, VNC, and more.
If Red Hat Linux can do it, you can do it too…
With Red Hat Linux separating into the open source... |
|
|
Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... | | PC Magazine Windows XP SolutionsYou wanted more Windows XP solutions. Here they are
PC Magazine's Neil Randall heard you when you asked for more about Windows XP security, fighting spy- ware, and surviving a crash. This second edition includes more than 100 pages of new information about protecting your system, preventing problems, and rescuing data if something... | | Defense and Detection Strategies against Internet WormsThis is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,... |
|
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |