Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)

The MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide (Exam 70-214) is a one-of-a-kind integration text and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft Exam 70-214 objectives.

  • Completely Guaranteed Coverage of All...
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Public Key Infrastructure and Implementation and Design
Public Key Infrastructure and Implementation and Design
Today we are in the midst of an electronic business revolution. The growth of the Internet and e−commerce has presented businesses with an opportunity to forge new links with customers and partners by transcending borders and removing geographical barriers. Electronic information exchange and networking poses a greater threat than ever before...
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

Hack Proofing Windows 2000 Server
Hack Proofing Windows 2000 Server
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include...
Applied Public Key Infrastructure (Frontiers in Artificial Intelligence and Applications)
Applied Public Key Infrastructure (Frontiers in Artificial Intelligence and Applications)
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related...
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy