Home | Amazing | Today | Tags | Publishers | Years | Search 
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
The all-time best-selling TCP/IP book, this is still the reference for anyone who wants to learn about or work with the TCP/IP protocol suite. Justly renowned for its clarity and accessibility,this superb text covers wide area Internet backbones as well as local area network technologies like FDDI and Ethernet. This is volume 1 of a 3 part set...
Cisco Network Security Troubleshooting Handbook
Cisco Network Security Troubleshooting Handbook

With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network...

Building And Integrating Virtual Private Networks With Openswan
Building And Integrating Virtual Private Networks With Openswan
With the widespread use of wireless networking and the integration of VPN capabilities in most
modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more
and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless
network? Is your neighbor snooping on your WiFi
...
Comparing, Designing, and Deploying VPNs
Comparing, Designing, and Deploying VPNs

Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available,...

VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

End-to-End QoS Network Design : Quality of Service in LANs, WANs, and VPNs
End-to-End QoS Network Design : Quality of Service in LANs, WANs, and VPNs

Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to...

Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference

Get the in-depth technical details you need to support TCP/IP on the Windows Server 2003 platform with this comprehensive reference. Combining concepts with real-world packet examples, it steps layer by layer through the TCP/IP protocols and services that Windows Server 2003 supports to help you understand how they work and how they’re...

Computer Networks, Fourth Edition
Computer Networks, Fourth Edition

The world's leading introduction to networking-fully updated for tomorrow's key technologies.

Computer Networks, Fourth Edition is the ideal introduction to today's networks-and tomorrow's. This classic best seller has been thoroughly updated to reflect the newest and...

Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange
Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange
With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft® Windows 2003 and Microsoft® Windows XP have drastically simplified the support of encryption technologies in Windows...
CCSP: Securing Cisco IOS Networks Study Guide (642-501)
CCSP: Securing Cisco IOS Networks Study Guide (642-501)
Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides:
  • In-depth coverage of every SECUR exam objective
  • Practical information on Cisco security solutions
  • Hundreds of challenging practice...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy