Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Software Defined Networking with OpenFlow
Software Defined Networking with OpenFlow

Get hands-on with the platforms and development tools used to build OpenFlow network applications

Overview

  • Get to grips with the essentials of OpenFlow and its ecosystem features
  • Thorough overview of OpenSource switches, controllers, and tools
  • Build your own laboratory and...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Introduction To Data Networks, Pdn, Lan, Man, Wan, And Wireless Data, Technologies And Systems
Introduction To Data Networks, Pdn, Lan, Man, Wan, And Wireless Data, Technologies And Systems

This book explains the different types of data networks, how the key types of data networks operate, and the different types of data services they provide. Data networks have become a fundamental part of almost all communication networks. Data networks are telecommunications networks that are installed and operated for information exchange...

Securing LINUX Step by Step
Securing LINUX Step by Step
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
Networking For Dummies
Networking For Dummies
Company just hooked you up to a network and you’re wondering what the heck you’re supposed to do with it? Tired of burning spreadsheets onto CDs just so you can share them with coworkers, and you’re wondering what it’ll take to set up a network in your organization? Been tasked with setting up a network and you don’t...
The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
"This book provides a diverse and solid foundation that will be
immensely beneficial to new network engineers, those looking for a
refresher or developers"
-- Alan Young, Google, Network Surveillance Team

"i haven't had time to read the manuscript
...
Cisco multicast routing and switching
Cisco multicast routing and switching

Another offering in the Cisco Technical Expert series, this book provides a good introduction to IP multicasting and Cisco routers. The important protocols for multicast service are covered in detail, including a discussion on the Internet Group Management Protocol (IGMP) and the Cisco Group Management Protocol (CGMP). Following...

Nortel Guide to VPN Routing for Security and VoIP
Nortel Guide to VPN Routing for Security and VoIP
Here's your handbook to Nortel VPN Router

If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN Router. Everything is here—hardware, software, laboratory set-ups, real-world examples, and, most importantly, advice gleaned from the...

Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

Managing Cisco Network Security
Managing Cisco Network Security
Providing good internetwork security and remaining current on new
hardware and software products is a never-ending task. Every network
security manager aims to achieve the best possible security because
the risks are real and the stakes are high. An enterprise must decide
what level of security is required, taking into account
...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy