Home | Amazing | Today | Tags | Publishers | Years | Search 
Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

The Complete FreeBSD, Fourth Edition
The Complete FreeBSD, Fourth Edition

FreeBSD is by far the most popular version of BSDВ®, the legendary operating system that has contributed a great deal to every version of UnixВ® in use today (including Mac OSВ® X). Originally a community effort by the University of California at Berkeley, FreeBSD was aimed at making Unix a little friendlier and easier to...

Video Systems in an IT Environment: The Essentials of Professional Networked Media
Video Systems in an IT Environment: The Essentials of Professional Networked Media
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV...
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers,...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Building a Monitoring Infrastructure with Nagios
Building a Monitoring Infrastructure with Nagios
Build real-world, end-to-end network monitoring solutions with Nagios

 

This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David...

Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

How the Internet Works (8th Edition)
How the Internet Works (8th Edition)
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
Cisco Secure Internet Security Solutions
Cisco Secure Internet Security Solutions
Text concentrating on each member of the Cisco Secure product family, showing how to use each one to create an ultimately secure network for Internet use. Discusses threats posed by the Internet, such as hackers and viruses, and how to combat them using Cisco products. Also shows how to create firewalls and other barriers against unwanted attacks....
Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Networking: A Beginner's Guide (Network Professional's Library)
Networking: A Beginner's Guide (Network Professional's Library)

Essential Skills--Made Easy!

Get a solid introduction to networking with this hands-on guide. You'll get all the core information you need to get started--including design and configuration, hardware, networking protocols, remote access, and security--plus, you'll find blueprints that map out network topologies and the OSI networking...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy