Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers,...
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Performance Analysis for Java Websites
Performance Analysis for Java Websites

How well a Web site performs while receiving heavy user traffic is an essential factor in an organization's overall success. How can you be sure your site will hold up under pressure?

Performance Analysis for Java(TM) Web Sites is an information-packed guide to...

CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification
from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this
certification is to provide professional-level recognition to network engineers in the design and
implementation of Cisco secure networks. This
...
Newnes PC Troubleshooting Pocket Book
Newnes PC Troubleshooting Pocket Book
Newnes PC Troubleshooting Pocket Book provides a concise and compact reference that describes, in a clear and straightforward manner, the principles and practice of faultfinding and upgrading PCs and peripherals. The strong practical emphasis is backed up with many illustrations and examples of real-lie problems. The book is aimed at anyone who...
Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
Switching to the Mac: The Missing Manual, Lion Edition
Switching to the Mac: The Missing Manual, Lion Edition
What’s going on with the Mac these days?

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has quadrupled since 2005—it’s now around 20 percent of computer sales in the U.S. And then there’s the most
...
OpenView Network Node Manager: Designing and Implementing an Enterprise Solution
OpenView Network Node Manager: Designing and Implementing an Enterprise Solution

The only complete, practical guide to HP Network Node Manager!

HP’s OpenView Network Node Manager (NNM) is the industry’s most powerful platform for enterprise-wide IP network management based on SNMP standards. Now, one of HP’s leading NNM consultants has written the definitive, best-practices guide...

How the Internet Works (8th Edition)
How the Internet Works (8th Edition)
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy