|
|
|
|
Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... | | Switching to the Mac: The Missing Manual, Leopard EditionIs Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac... | | Practical Linux Security Cookbook
Key Features
-
This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
-
More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
-
Enhance file system security and local and remote
... |
|
SSL Remote Access VPNs (Networking Technology: Security)This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,... | | | | Configuring Sonicwall FirewallsEvery enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security. The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet-filtering firewalls allowing... |
|
Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | Practical Linux Infrastructure
Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.
... | | Cisco ASA and PIX Firewall Handbook, First EditionA concise reference to implementing the most popular PIX Firewall 7.0 and 6.3 features Learn how to configure the new PIX Firewall version 7.0 Understand, install, and support the most common features of the best-selling Cisco Systems® PIX and IOS firewall products Learn from configuration examples that graphically illustrate complex... |
|
Firewall Policies and VPN ConfigurationsDeploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will... | | Red Hat Linux Networking and System Administration (With CD-ROM)Your Official Red Hat® Linux® Guide to Networking and System Administration
Reviewed by the experts at Red Hat, this in-depth guide delivers all the know-how you need to set up and manage a state-of-the-art Linux network.
Red Hat Linux experts Terry Collings and Kurt Wall start with the basics—network planning and Red... | | Sams Teach Yourself Network Troubleshooting in 24 HoursA practical, hands-on guide to network troubleshooting that emphasizes diagnostic techniques that many professionals, including engineers, architects, doctors, scientists, attorneys, etc. can really relate to. In today's pervasive network environment, many of these people are often responsible for "fixing the network" if it goes down.... |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |