Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
Crocodile: Evolution's Greatest Survivor
Crocodile: Evolution's Greatest Survivor
Few animals inspire the sort of awe and fear that the crocodilians do. Those who share their habitats tread warily at the water’s edge, and their mythology abounds with stories and legends of these giant predators. The more dangerous the species, the more fearsome the tales of its exploits, but these tales have arisen from...
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy