Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Building a Home Security System with Raspberry Pi
Building a Home Security System with Raspberry Pi

Build your own sophisticated modular home security system using the popular Raspberry Pi board

About This Book

  • This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet
  • It covers the...
Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS projectfrom needs definition to deployment considerations. Implementation...
Adaptive Antennas and Receivers (Electrical and Computer Enginee)
Adaptive Antennas and Receivers (Electrical and Computer Enginee)
In our modern age of remote sensing, wireless communication, and the nearly endless list of other antenna-based applications, complex problems require increasingly sophisticated solutions. Conventional antenna systems are no longer suited to high-noise or low-signal applications such as intrusion detection. Detailing highly effective approaches to...
Red Hat Linux 7.2: The Complete Reference, Second Edition
Red Hat Linux 7.2: The Complete Reference, Second Edition

The Most Comprehensive Red Hat Linux Resource Available

Master Red Hat Linux--including version 7.2--using this authoritative reference. Linux guru Richard Petersen provides details on networking, kernel management, Internet servers, system administration, and much more. You'll also get full coverage of Internet clients, office suites,...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy