Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Secure Roaming in 802.11 Networks (Communications Engineering)
Secure Roaming in 802.11 Networks (Communications Engineering)
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide...
Cisco Network Security Troubleshooting Handbook
Cisco Network Security Troubleshooting Handbook

With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network...

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Writing Excel Macros: Automating Excel to Work for You
Writing Excel Macros: Automating Excel to Work for You

Microsoft Excel is an enormously powerful and flexible application. Yet despite its powerful feature set, there is a great deal that Excel either does not allow you to do or does not allow you to do easily through its user interface. And in spite of Excel's reputation as the most widely used spreadsheet application, the majority...

The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Citrix XenApp Platinum Edition for Windows: The Official Guide
Citrix XenApp Platinum Edition for Windows: The Official Guide

The Authorized Guide to Citrix XenApp Platinum Edition for Windows

Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs...

Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy