Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Personal Firewalls for Administrators and Remote Users
Personal Firewalls for Administrators and Remote Users

Personal firewalls explained—for remote corporate and home users.

In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these...

Linux Networking Clearly Explained
Linux Networking Clearly Explained

"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained

Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux
...

REST: From Research to Practice
REST: From Research to Practice

Anybody following the discussions around “Web Services” in recent years is aware of the fuzzy definition of the term, and a little bit of history can quite easily explain some of the confusions around current terminology (or use of terminology). The general idea of using Web technologies to not only deliver Web pages (HTML...

Juniper SRX Series
Juniper SRX Series
Security is one of the fastest moving segments within the realm of technology. Whereas most technology is created to offer new services or products, security is created to prevent the abuse of these new products and or services. In today’s world, where we are always connected in ways that have never been...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

How Linux Works
How Linux Works

Whether you're a systems administrator or a home user, you need to understand how Linux internals work before you can really master Linux-how it boots, how networking works, how to customize the kernel, and even what hardware to buy.

How Linux Works contains the kind of information normally handed down from
...

How to Cheat at Configuring ISA Server 2004
How to Cheat at Configuring ISA Server 2004
If deploying and managing ISA Server 2004 is just one of a hundred responsibilities you have as a System Administrator, How to Cheat at Configuring ISA Server 2004 is the perfect book for you. This is a concise, accurate, enterprise tested method for the successful deployment of ISA Server. Written by ISA Server guru and Microsoft Most...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy