Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

Maximum Mac OS X Security
Maximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)

UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy