Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Network Security
Mastering Network Security
The new edition of the highly-acclaimed and best-selling Mastering Network Security is here, and just in time! The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security...
Building a Home Security System with BeagleBone
Building a Home Security System with BeagleBone

With Boost libraries you can really unleash the power of C++. Learn to build applications faster and better through a cookbook approach that uses tons of recipes to make it all so easy to assimilate and apply.

  • Build your own state-of-the-art security system
  • Monitor your system from anywhere you can receive...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

CCSP Self-Study CCSP CSI: Exam Certification Guide, Second Edition
CCSP Self-Study CCSP CSI: Exam Certification Guide, Second Edition

CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and...

Microsoft Log Parser Toolkit
Microsoft Log Parser Toolkit
Do you want to find Brute Force Attacks against your Exchange Server? Would you like to know who is spamming you? Do you need to monitor the performance of your IIS Server? Are there intruders out there you would like to find? Would you like to build user logon reports from your Windows Server? Would you like to export your logs to XML? Would you...
Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
Cisco Security Agent
Cisco Security Agent
Prevent security breaches by protecting endpoint systems with Cisco Security Agent (CSA), the Cisco host Intrusion Prevention System Learn the basics of endpoint security and why it is so important in today's security landscape Protect endpoint systems from hackers, viruses, and worms with host intrusion prevention security Prevent...
The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
The international activities of regions have attracted considerable political and scholarly attention in recent years. This has perhaps been most notable in Europe, where the protagonism of regions within the EU and the alliances among regions have generated a substantial literature, but the phenomenon has also marked federal...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy