Home | Amazing | Today | Tags | Publishers | Years | Search 
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Offering Apple's legendary ease of use plus everything you would expect from a Unix-based operating system--preemptive multitasking, symmetric multiprocessing, and support for networking and security standards--Mac OS X Server has revolutionized the world of network administration. Mac OS X Tiger server continues that tradition by offering more...
Cisco Express Forwarding (Networking Technology)
Cisco Express Forwarding (Networking Technology)
How does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Secure Your Network for Free
Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for
...
Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)

Telecommunications Essentials, Second Edition, provides a comprehensive overview of the rapidly evolving world of telecommunications. Providing an in-depth, one-stop reference for anyone wanting to get up to speed on the $1.2 trillion telecommunications industry,...

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Microsoft Windows XP Power Productivity (Mastering)
Microsoft Windows XP Power Productivity (Mastering)
The Keys to Your Productivity Are Right There, Inside Windows

Windows XP is packed with utilities and other features that can help you work smarter and faster. The trick is knowing what they are and how and when to use them. Microsoft Windows XP Power Productivity teaches you how to leverage these tools to automate,...

Special Edition Using Linux
Special Edition Using Linux
Linux is a significant force in the server room and the desktop, delivering reliability, ease of installation and administration, high performance, security, and robust applications. Special Edition Using Linux 6E is written to the just-released 2.4.x kernel and includes the following topics: installation and configuration of Red Hat Linux, Caldera...
Practical Firewalls
Practical Firewalls
Practical Firewalls enables you to get a thorough understanding of all of the basic concepts involved in creating and maintaining a firewall. Aimed at beginning to intermediate network administrators, this book presents information in a manner so that you do not need a large background in the networking field. It provides "real world"...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy