Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Networks: Optimisation and Evolution (Cambridge Series in Statistical and Probabilistic Mathematics)
Networks: Optimisation and Evolution (Cambridge Series in Statistical and Probabilistic Mathematics)
Point-to-point vs. hub-and-spoke. Questions of network design are real and involve many billions of dollars. Yet little is known about optimizing design - nearly all work concerns optimizing flow assuming a given design. This foundational book tackles optimization of network structure itself, deriving comprehensible and realistic design principles....
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004.

The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from...

Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Sams Teach Yourself Linux Security Basics in 24 Hours
Sams Teach Yourself Linux Security Basics in 24 Hours
This book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
The rapidly growing amount of data, available from different technologies in the field of bio-sciences, high-energy physics, economy, climate analysis, and in several other scientific disciplines, requires a new generation of machine learning and statistical methods to deal with their complexity and heterogeneity. As data collections becomes...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy