|
|
|
|
|
Cisco Secure Intrusion Detection SystemOrganizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to... | | CCNP Security IPS 642-627 Official Cert Guide
Learn, prepare, and practice for exam success
CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,... | | |
|
Hacking VoIP: Protocols, Attacks, and CountermeasuresVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,... | | Wi-Foo : The Secrets of Wireless Hacking The definitive guide to penetrating and defending wireless networks.
Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any... | | CCSP: Securing Cisco IOS Networks Study Guide (642-501)Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides:
- In-depth coverage of every SECUR exam objective
- Practical information on Cisco security solutions
- Hundreds of challenging practice
... |
|
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card
Research and Advanced Applications Conference (CARDIS 2018), which was held in
Montpellier, France, during November 12–14, 2018, and organized by the Montpellier
Laboratory of Informatics, Robotics and Microelectronics (LIRMM). ... | | Security Log Management: Identifying Patterns in the ChaosLogs, logs, logs. Ever since I started taking my first steps in the world of security, it has been clear that “the log” plays a crucial—and sometimes undervalued— role in the security management of any IT infrastructure.This fact alone explains the plethora of tools, applications, and solutions whose only... | | Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
Result Page: 6 5 4 3 2 1 |