 |
|
|
 Cisco Network Professional's Advanced Internetworking GuideIdeal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification.
The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP,... |  |  Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... |  |  Crocodile: Evolution's Greatest Survivor
Few animals inspire the sort of awe and fear that the crocodilians do. Those who share their habitats tread warily at the water’s edge, and their mythology abounds with stories and legends of these giant predators. The more dangerous the species, the more fearsome the tales of its exploits, but these tales have arisen from ... |
|
 Introduction to Numerical Geodynamic Modelling
Numerical modelling of geodynamic processes was predominantly the domain of high-level mathematicians experienced in numerical and computational techniques. Now, for the first time, students and new researchers in the Earth Sciences can learn the basic theory and applications from a single, accessible reference text. Assuming only minimal... |  |  JUNOS Security
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations... |  |  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |
|
 Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand.... |  |  CCNA Security Lab Manual
The only authorized Lab Portfolio for the new Cisco Networking Academy CCNA Security Course
-
Gives CCNA Security students a comprehensive, printed and bound lab resource containing all of the course's labs, for use whenever Internet access isn't available
-
Handy printed...
|  |  MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the ... |
|
| Result Page: 21 20 19 18 17 16 15 14 13 12 11 |