|
|
|
|
Check Point NG VPN-1/Firewall-1: Advanced Configuration and TroubleshootingSecurity of corporate networks has become big business. Many companies are willing to provide hardware, software, consulting, design, and implementation services.The product space is vast, offering many different levels of products that claim to provide all manner of solutions.The problem with the current state of the security space... | | The Best Damn Cisco Internetworking Book PeriodCisco is almost synonymous with networking.There is almost no area of networking in which Cisco is not a key player, or is not making inroads.You name it Cisco makes it—routers, switches, firewalls, management software, and so on. It can be quite an undertaking to locate and acquire all of the information needed to configure,... | | Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live... |
|
| | How to Cheat at Managing Windows Small Business ServerYou’re holding this book in your hands at the local bookstore, or maybe viewing it online. Better yet, you’re sitting at your desk with a cup of coffee looking at this foreword.You’re wondering if you bought the right book.
You’re probably expecting to find some serious shortcuts to managing ... | | |
|
|
| | | | Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |