Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Host Intrusion Prevention with CSA
Advanced Host Intrusion Prevention with CSA
The Cisco Security Agent product is extremely successful in protecting endpoints around the world. The power it
provides must be understood to use it effectively and efficiently. This book attempts to provide guidance and examples
to help CSA users worldwide do just that.

This book is intended for anyone currently using the CSA
...
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

This book is about expanding Internet business risk management strategies into resilience such as software diversity; into financial risk transfer instruments such as insurance policies, catastrophe bonds, performance bonds, and self-insurance as in Basel II; and into reputation systems.

Traditional Internet performance and...

Managing Cisco Network Security
Managing Cisco Network Security
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Cisco Secure Intrusion Detection System
Cisco Secure Intrusion Detection System

Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...

Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Fires in Silos: Hazards, Prevention, and Fire Fighting
Fires in Silos: Hazards, Prevention, and Fire Fighting
Storage of chemicals in silos is ubiquitous in the chemical, pharmaceutical and other producing industries, and some 80 % of all bulk materials are inflammable. It is here that the risk of large fires arises due to self-ignition or the intrusion of different ignition sources. For firefighters, most silo fires are very difficult to handle due to the...
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Snort 2.0 Intrusion Detection
    Snort 2.0 Intrusion Detection
    “Intruder Alert! Intruder Alert! Warning,Will Robinson!” When we heard that
    ominous announcement emanating from a robot as it twisted and turned with arms
    thrashing and head spinning, we sat galvanized to our televisions waiting for the
    intruder to reveal itself.Would this be the end of Will Robinson, as we knew him?...
    Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control
    Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control
    This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and...
    Practical Internet Security
    Practical Internet Security
    As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external...
    unlimited object storage image
    Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
    ©2021 LearnIT (support@pdfchm.net) - Privacy Policy