|
|
|
|
|
| | CCIE Security Exam Certification Guide (CCIE Self-Study)Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
| | |
|
Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Overview
-
Learn key reconnaissance concepts needed as a penetration tester
-
Attack and exploit key features, authentication, and sessions on web...
| | Guide to Computer Network Security (Computer Communications and Networks)
This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems... | | Wireless Network Security (Signals and Communication Technology)Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the... |
|
Professional Penetration Testing: Creating and Operating a Formal Hacking LabSave yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a... | | iOS Hacker's Handbook
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS... | | IBM WebSphere DataPower SOA Appliance Handbook
Expert Guide to Deploying, Using, and Managing DataPower SOA Appliances
IBM® WebSphere® DataPower® appliances can simplify SOA deployment, strengthen SOA security, enhance SOA performance, and dramatically improve SOA return on... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |