Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Openvpn: Building And Integrating Virtual Private Networks
Openvpn: Building And Integrating Virtual Private Networks
OpenVPN is an outstanding piece of software that was invented by James Yonan in the year 2001 and has steadily been improved since then. No other VPN solution offers a comparable mixture of enterprise-level security, usability, and feature richness. We have been working with OpenVPN for many years now, and it has always proven to be the best...
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers,...
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)
This book explains how to build a Virtual Private Network (VPN), a collection of
technologies that creates secure collections or "tunnels" over regular Internet lines. It
discusses costs, configuration, and how to install and use technologies that are available for
Windows NT and UNIX, such as PPTP and L2TP, Altavista
...
RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy