Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Contains a series of 25 to 30 page chapter by world-renowned network security personalities written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
Provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. This work shows readers how to use these products to create a secure network with virtual private networking features. It also covers various objectives on Check Point's CCSA exam.
Microsoft's flagship ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and Speed. This book provides the system administrators with an understanding of the features of this Internet Server.
A guide to developing mobile applications using Microsoft technologies. It focuses on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform.
Offers information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization.
Active Directory Services changes the way IT professionals design, plan, configure and administer their Windows NT networks. Systems Engineers will probably spend much of their time planning for and deploying Active Directory Services in many different environments. This book aims to provide coverage of everything they will need to succeed.
Written for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH) to the implementation of security policies, plans, and recovery protocols, this book helps users secure their wireless network before its security is compromised.
Choosing the right mobile phone and service plan can be overwhelming. This book aims to help consumers choose what program may best suit them. It helps streamline the wireless-buying process by providing a complete listing of wireless providers and the details of their plans. International listings include coverage of USA, Africa and Asia-Pacific.
Deals with specific e-mail clients, server environments, and anti-virus software. This book places emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. It also shows how to scan content and counter email address forgery attacks.
Hundreds of thousands of business enterprises, large and small, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Part of the "Hack Proofing" series, this book gives system administrators the information they need to fortify their operating system against the never-ending threat of hackers.
A guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. It covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. It gives an introduction to .NET and its XML building blocks - used to build a Web site.
Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Part of the "Hack Proofing" series, this book provides developers with step-by-step instructions for developing secure web applications.
Gives guidance to install and configure Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. It does not cover the Active Directory function of Windows 2000.
SQL Server 2000 is one of the key components of .NET. This title addresses the needs of IT professionals migrating from the popular SQL 7 databases to the SQL 2000, as well as those who are starting from scratch. It covers key features of SQL Server 2000 including; XML support, enhanced data-mining capabilities and integration with Windows 2000.
Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment. This work presents the hardware and software that comprise the Cisco IDS. It also covers Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs.
Focuses on planning and configuring networks and devices for IP 6. This book covers how to: increase the IP address size from 32 bits to 128 bits; support more levels of addressing hierarchy; support an increased number of addressable nodes; and, support simpler auto-configuration of addresses.
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. This book teaches how to prevent, detect, troubleshoot and correct TCP/IP network problems. It focuses on identifying problem areas, including correcting protocol errors, DNS route problems, application faults and slow response times.
Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations. This book provides step-by-step instructions on how to install and deploy a fixed wireless network.
Introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. This book discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, and more.
Covers major Cisco Internetworking concepts and configurations. This book offers cross reference to Cisco internetworking topics that include: Voice Over IP, Remote Access, Wireless, AVVID, and QoS. It also covers technologies that include: AVVID, SIP, MGCP, and more.
Offers coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network. This book covers: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; and, supporting an increased number of addressable nodes.
Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and SonicWall. This work describes what features can be controlled by a policy, and presents the reader the steps for writing the policy to fit the objective.
Teaches system administrators how to configure, deploy, and troubleshoot "Symantec Enterprise Edition" in an enterprise network. This book reflects Symantec's philosophy of 'Centralized Antivirus Management'. It provides system administrators with a holistic approach to defending their networks from malicious viruses.
Bluetooth is the most exciting development in wireless computing. This title provides embedded applications developers with advanced tutorials and code listings written to the Bluetooth's specification, version 1.1.
A guide to protecting your Windows 2000 Network. It covers methods of attack and hacker secrets. It is suitable for IT professionals who want to run secure networks, or build secure software.
A guide to Ruby, a popular Object-Oriented Programming Language. It is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. It helps readers learn how to develop, implement, organize and deploy applications using Ruby.
Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN, and management solutions. This title lets you understand NGX R65 operational changes. It features SVN architecture, VPN-1 features, and VPN-1 Power VSX. It tells how to deploy SmartClients and SmartManagement.
Lego Mindstorms lets you design and program robots that can do just about anything. This illustrated title provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies. It is specifically targeted at new users of the Lego Mindstorms RIS 2.0.
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. This book shows how to do a complete security assessment based on the NSA's guidelines.
Includes coverage of the additions to the PIX Firewall family, including the CiscoSecure PIX Firewall (PIX) Software Release 6.0. This guide instructs the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting, and more.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.