Hack Proofing Sun Solaris 8 Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... CCNP Security Secure 642-637 Official Cert Guide
Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
Configuring IPv6 for Cisco IOS Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
Document Security: Protecting Physical and Electronic Content
Several electronic layers exist in most documents, a fact overlooked
by many writers. Probing these sublayers often reveals information
not intended for release by the author. Documents in electronic formats
create a “palimpsest” that even semiskilled investigators can probe for
Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Recipes designed to educate you extensively on the penetration testing principles and Kali...
|Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |