|
|
|
|
|
Web Caching (O'Reilly Internet Series)A properly designed cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy and operate an effective web caching service. It also covers the... | | Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
... | | Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |
|
Building a TypePad Blog People Want to Read
Today, it seems everyone—from multinational corporations to your kid’s second-grade teacher—has a blog. They all have one, in part, because they have information they want to share with others—from customers and clients to neighbors and parents. But to actually build a good blog—to create a blog people want to... | | Hyper-V Replica Essentials
For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.
Overview
-
A practical step-by-step guide that goes beyond theory and...
| | Packet Filtering: Catching the Cool PacketsThis book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than... |
|
|
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 |