|
|
|
|
CCSP Cisco Secure PIX Firewall Advanced Exam Certification GuideOfficial self-study test preparation guide for the Cisco 9E0-111 and 642-521 CSPFA exams
Coverage of the CSPFA topics enables you to identify and fill your knowledge gaps before the exam date. You'll learn about:
- The comprehensive line of Cisco PIX Firewall products and the technology and features central to each...
| | Open Source Security Tools: Practical Guide to Security Applications, A
Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.
Written with the harried IT manager in mind, Open Source Security Tools is a practical,... | | Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
The Mobile Connection: The Cell Phone's Impact on SocietyRich Ling provides a compelling examination of the real impact of mobile telephony. It's not about technology, it's about people. We need more of these kinds of studies. --Don Norman, Co-Founder, Nielsen Norman Group and author of Emotional Design
This book combines scientific rigor, penetrating insight, and attention to an... | | | | Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.
The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following ... |
|
| | Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... | | Python Penetration Testing Essentials
Employ the power of Python to get the best out of pentesting
About This Book
-
Learn to detect and avoid various types of attacks that put the privacy of a system at risk
-
Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
... |
|
Network Security BibleIf you need a solid foundation in network security, this is it
Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how... | | | | Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the
fundamentals of advanced network security. The previous edition of this book placed significant
emphasis on intrusion detection, but this edition aims to provide a more balanced approach to
the topic of network defense and countermeasures. As... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |