Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

CCNP Security Secure 642-637 Official Cert Guide
CCNP Security Secure 642-637 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attacks against organizational network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so...
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Windows® 7 Resource Kit
Windows® 7 Resource Kit

In-depth and comprehensive, this RESOURCE KIT delivers the information you need to administer your Windows 7 system. You get authoritative technical guidance from those who know the technology best—Microsoft Most Valuable Professionals (MVPs) and the Windows 7 product team—along with essential scripts and resources. In...

Building And Integrating Virtual Private Networks With Openswan
Building And Integrating Virtual Private Networks With Openswan
With the widespread use of wireless networking and the integration of VPN capabilities in most
modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more
and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless
network? Is your neighbor snooping on your WiFi
...
RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
IPSec VPN Design
IPSec VPN Design

Master IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group

  • Understand how IPSec VPNs are designed, built, and administered

  • Improve VPN performance through enabling of modern VPN services...

Building MPLS-Based Broadband Access VPNs
Building MPLS-Based Broadband Access VPNs

Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs. This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling...

Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy