Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)

UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data...

Machine Learning and Data Mining for Computer Security: Methods and Applications
Machine Learning and Data Mining for Computer Security: Methods and Applications

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the...

The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
CCNP Security Secure 642-637 Official Cert Guide
CCNP Security Secure 642-637 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Solaris Security
Solaris Security
At last, a security book just for Solaris and UNIX(r) system administrators. Learn
the specifics for making your system secure, whether it's an organization-wide
network or a standalone workstation. Expert author Peter Gregory has managed
security for everything from top-secret corporate research facilities to casinos.
...
Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy