Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Mastering Red Hat Enterprise Linux 3
Mastering Red Hat Enterprise Linux 3
Your Complete Guide to the World’s Leading Linux Enterprise Distribution

Red Hat Enterprise Linux 3 is emerging as the corporate Linux standard. One of the first books to focus on this robust product, Mastering Red Hat Enterprise Linux 3 gives you the practical information you need to install, configure, and...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Linux Firewalls (3rd Edition)
Linux Firewalls (3rd Edition)
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most...
Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

Pragmatic Version Control Using Subversion
Pragmatic Version Control Using Subversion
This book covers the theory behind version control and how it can help developers become more efficient, work better as a team, and keep on top of software complexity. All projects need version control: it's the lifeblood of any project's infrastructure, yet half of all project teams in the U.S. don't use any version control at all. Many others...
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
Learning Nagios 4
Learning Nagios 4

Learn how to set up Nagios 4 in order to monitor your systems efficiently About This Book Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a...

Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques
Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques

Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world’s slickest and most elegant operating system, then this is the book for...

A Practical Guide to UNIX® for Mac OS® X Users
A Practical Guide to UNIX® for Mac OS® X Users
The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples!

Beneath Mac OS® X’s stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX®. With unmatched clarity and...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Solaris Operating Environment Administrator's Guide, Fourth Edition
Solaris Operating Environment Administrator's Guide, Fourth Edition
Fast solutionsfor every Solaris 9 system administration challenge—directfrom Sun!

SolarisOperating Environment System Administrator’s Guide, Fourth Edition is the definitive quick-start tutorialfor every new Solaris system administrator—and the ideal fast-accessreference for every Solaris administrator, regardless of...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy