Home | Amazing | Today | Tags | Publishers | Years | Search 
Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Absolute OpenBSD: UNIX for the Practical Paranoid
Absolute OpenBSD: UNIX for the Practical Paranoid

The definitive guide to OpenBSD

Foreword by Henning Brauer, OpenBSD PF Developer

OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD...

Communications and Networking: An Introduction (Undergraduate Topics in Computer Science)
Communications and Networking: An Introduction (Undergraduate Topics in Computer Science)

This textbook presents a detailed introduction to the essentials of networking and communications technologies. Revised and updated, this new edition retains the step-by-step approach of the original, organised to help those without a strong knowledge of the subject matter. Features: provides chapter-ending summaries and review questions, an...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
5G LTE Narrowband Internet of Things (NB-IoT)
5G LTE Narrowband Internet of Things (NB-IoT)

This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and...

Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's...

An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications

Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe. The book assumes no more than a...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Learning Pentesting for Android Devices
Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy