Home | Amazing | Today | Tags | Publishers | Years | Search 
The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams.

This two-in-one Study Guide provides:

  • In-depth coverage of all exam topics
  • Practical information on implementing Cisco's Secure PIX and Secure VPN technologies
  • ...
Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

The Internet connects millions of people around the world and allows for immediate communication and access to a seemingly limitless amount of information. Data, video, and voice, almost every single type of communication, travels across the Internet. Some of this communication is private.

The language...

IPSec VPN Design
IPSec VPN Design

Master IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group

  • Understand how IPSec VPNs are designed, built, and administered

  • Improve VPN performance through enabling of modern VPN services...

Wi-Foo : The Secrets of Wireless Hacking
Wi-Foo : The Secrets of Wireless Hacking

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

Openvpn: Building And Integrating Virtual Private Networks
Openvpn: Building And Integrating Virtual Private Networks
OpenVPN is an outstanding piece of software that was invented by James Yonan in the year 2001 and has steadily been improved since then. No other VPN solution offers a comparable mixture of enterprise-level security, usability, and feature richness. We have been working with OpenVPN for many years now, and it has always proven to be the best...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy