Home | Amazing | Today | Tags | Publishers | Years | Search 
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Network Science and Cybersecurity (Advances in Information Security)
Network Science and Cybersecurity (Advances in Information Security)

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of  Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable...

Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

Cascading Style Sheets: The Designer's Edge
Cascading Style Sheets: The Designer's Edge

CSS is finally supported by all modern web browsers, empowering web designers to do what they’ve been hungering to do for years: control layout more precisely, use color more effectively, and expand typographic options beyond the frustrating limitations of the past. So where to begin? Where can you get design-focused instruction on CSS...

Wi-Foo : The Secrets of Wireless Hacking
Wi-Foo : The Secrets of Wireless Hacking

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

CCSP SECUR Exam Cram 2 (642-501)
CCSP SECUR Exam Cram 2 (642-501)

Exam Cram 2 fills the needs of 1,000s of Certified Security Specialists and new security cert candidates looking to upgrade to a CCSP.

  • SECUR is the first and most important of the 5 required exams to obtain a CCSP.

  • ...
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
Managing Your Personal Finances with Quicken : Visual QuickProject Guide
Managing Your Personal Finances with Quicken : Visual QuickProject Guide

The Visual QuickProject Guide that you hold in your hands offers a unique way to learn about new technologies. Instead of drowning you in theoretical possibilities and lengthy explanations, this Visual QuickProject Guide uses big, color illustrations coupled...

Microsoft Log Parser Toolkit
Microsoft Log Parser Toolkit
Do you want to find Brute Force Attacks against your Exchange Server? Would you like to know who is spamming you? Do you need to monitor the performance of your IIS Server? Are there intruders out there you would like to find? Would you like to build user logon reports from your Windows Server? Would you like to export your logs to XML? Would you...
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition

Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy