|
|
|
|
Juniper SRX Series
Security is one of the fastest moving segments within the realm of technology. Whereas
most technology is created to offer new services or products, security is created to prevent
the abuse of these new products and or services. In today’s world, where we are
always connected in ways that have never been ... | | IP in Wireless NetworksThe complete network professional's guide to delivering wireless IP.
- Wireless IP: the professional's guide to understanding data in wireless networks
- Covers IP in 802.11, Bluetooth(tm), GSM/GPRS, W-CDMA, cdma2000, i-mode, and more
- Includes expert insights into architecture, mobility models, and...
| | |
|
The Mathematics of Coding Theory
This book is intended to be accessible to undergraduate students with two
years of typical mathematics experience, most likely meaning calculus with a little
linear algebra and differential equations. Thus, specifically, there is no assumption
oLa background inabstr&;t algebra or number theory, nor of probability, nor of
linear... | | Firewalls 24sevenFor experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.
Written to... | | The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential.
This second edition of The Book of PF has been completely updated and... |
|
|
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnortSystem administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the... | | IPSec VPN DesignMaster IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group
-
Understand how IPSec VPNs are designed, built, and administered
-
Improve VPN performance through enabling of modern VPN services... | | Advanced UNIX Programming (Sams White Book Series)Advanced UNIX Programming goes beyond the fundamentals of UNIX programming and presents information and techniques the readers needs to expand their knowledge base. Designed for professional UNIX programmers, this book builds on the skills and knowledge the reader already possesses. It includes coverage of internet processes, interprocess control,... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |