Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Deploying Voice over Wireless LANs (Networking Technology)
Deploying Voice over Wireless LANs (Networking Technology)

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

 

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly...

Wi-Foo : The Secrets of Wireless Hacking
Wi-Foo : The Secrets of Wireless Hacking

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification
from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this
certification is to provide professional-level recognition to network engineers in the design and
implementation of Cisco secure networks. This
...
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
FreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.

Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas...

Security+ Study Guide
Security+ Study Guide
Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides

The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test
...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Building a Windows IT Infrastructure in the Cloud: Distributed Hosted Environments with AWS
Building a Windows IT Infrastructure in the Cloud: Distributed Hosted Environments with AWS
Everybody’s talking about cloud services today. It’s one of the hot new buzzwords, but most of the conversation is about how to develop custom applications in the cloud. While that is a really important topic, it ignores another very useful attribute of a distributed cloud: as a great place to build and...
Penetration Testing and Network Defense (Cisco Press Networking Technology)
Penetration Testing and Network Defense (Cisco Press Networking Technology)

The practical guide to assessing network vulnerabilities andmanaging security risk.

  • Assess your network's defensive strengths and eliminatevulnerabilities with proven internal testing methodologies

  • Learn how to perform simulated attacks...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy