Home | Amazing | Today | Tags | Publishers | Years | Search 
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Degunking Windows
Degunking Windows

All Windows users know that their PCs slowly develop problems—nasty gunk build-up that plagues their PCs. Here are some of the common symptoms: your PC starts to run slower, your applications will crash without warning, you can’t easily find your files and folders, you start getting tons of spam, and you encounter a host of other...

Degunking Linux
Degunking Linux
Linux has grown in popularity and is increasingly being adopted by home users and others who laud this nearly un-crashable, free operating system. But setting up a Linux OS can be tricky and time consuming. And managing a Linux system can be even more difficult if you don't have the right knowledge. Degunking Linux expertly shows readers...
Linux Programming Unleashed
Linux Programming Unleashed
Linux Programming Unleashed is a complete and comprehensive reference for intermediate to advanced Linux developers that covers every possible use of Linux. Topics include: Core Linux Programming; Interprocess Communication; Device Drivers; Development Tools (make, Emacs, diff and patch, etc.); Programming the User Interface; programming...
Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup...
Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Linux Kernels Internals (2nd Edition)
Linux Kernels Internals (2nd Edition)

Since the introduction of Linix version 1.2 in March 1995, a worldwide community has evolved from programmers who were attracted by the reliability and flexibility of this completely free operating system. Now at version 2.0, Linux is no longer simply the operating system of choice for hackers, but is being successfully employed in commercial...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy