Cisco Secure Intrusion Detection System
Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...
CCNP Security IPS 642-627 Official Cert Guide
Learn, prepare, and practice for exam success
CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,...
Hacking VoIP: Protocols, Attacks, and Countermeasures
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...
Wi-Foo : The Secrets of Wireless Hacking
The definitive guide to penetrating and defending wireless networks.
Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...
CCSP: Securing Cisco IOS Networks Study Guide (642-501) Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides:
- In-depth coverage of every SECUR exam objective
- Practical information on Cisco security solutions
- Hundreds of challenging practice
Security Log Management: Identifying Patterns in the Chaos Logs, logs, logs. Ever since I started taking my first steps in the world of security,
it has been clear that “the log” plays a crucial—and sometimes undervalued—
role in the security management of any IT infrastructure.This fact
alone explains the plethora of tools, applications, and solutions whose only...
Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
Tucci and Usmani's The Business of Photography
So you’ve decided to be a photographer. You studied photography in
college or went to art school, and you’ve come to the point of deciding
that it’s time to hang out your shingle. Or maybe you’re self-taught and
everyone loves your work and says, “Hey, you could make...
|Result Page: 6 5 4 3 2 1 |