|
|
|
|
Handbook of Wireless Networks and Mobile Computing
The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For... | | Snort 2.1 Intrusion Detection, Second Edition
Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice... | | Configuring Sonicwall FirewallsEvery enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security. The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet-filtering firewalls allowing... |
|
|
Wireless Networking HandbookMany organizations utilize traditional wire-based networking technologies to establish connections among computers. These technologies fall into the following three categories:
• Local area networks (LANs) • Metropolitan area networks (MANs) • Wide area networks (WANs)
LANs support the sharing of... | | | | Network Security Tools : Writing, Hacking, and Modifying Security ToolsThis concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your... |
|
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |