Utvidet returrett til 31. januar 2025

Bøker av Syngress

Filter
Filter
Sorter etterSorter Populære
  • - How to Own the Box
    av Syngress
    714,-

    Contains a series of 25 to 30 page chapter by world-renowned network security personalities written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.

  • av Syngress
    765,-

    Provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. This work shows readers how to use these products to create a secure network with virtual private networking features. It also covers various objectives on Check Point's CCSA exam.

  • - Building Firewalls for Windows 2000
    av Syngress
    714,-

    Microsoft's flagship ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and Speed. This book provides the system administrators with an understanding of the features of this Internet Server.

  • av Syngress
    645,-

    A guide to developing mobile applications using Microsoft technologies. It focuses on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform.

  • av Syngress
    765,-

    Offers information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization.

  • av Syngress
    714,-

    Active Directory Services changes the way IT professionals design, plan, configure and administer their Windows NT networks. Systems Engineers will probably spend much of their time planning for and deploying Active Directory Services in many different environments. This book aims to provide coverage of everything they will need to succeed.

  • av Syngress
    645,-

    Written for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH) to the implementation of security policies, plans, and recovery protocols, this book helps users secure their wireless network before its security is compromised.

  • av Syngress
    284,-

    Choosing the right mobile phone and service plan can be overwhelming. This book aims to help consumers choose what program may best suit them. It helps streamline the wireless-buying process by providing a complete listing of wireless providers and the details of their plans. International listings include coverage of USA, Africa and Asia-Pacific.

  • - Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
    av Syngress
    508,-

    Deals with specific e-mail clients, server environments, and anti-virus software. This book places emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. It also shows how to scan content and counter email address forgery attacks.

  • av Syngress
    765,-

    Hundreds of thousands of business enterprises, large and small, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Part of the "Hack Proofing" series, this book gives system administrators the information they need to fortify their operating system against the never-ending threat of hackers.

  • av Syngress
    645,-

    A guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. It covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. It gives an introduction to .NET and its XML building blocks - used to build a Web site.

  • av Syngress
    594,-

    Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Part of the "Hack Proofing" series, this book provides developers with step-by-step instructions for developing secure web applications.

  • av Syngress
    645,-

    Gives guidance to install and configure Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. It does not cover the Active Directory function of Windows 2000.

  • av Syngress
    645,-

    SQL Server 2000 is one of the key components of .NET. This title addresses the needs of IT professionals migrating from the popular SQL 7 databases to the SQL 2000, as well as those who are starting from scratch. It covers key features of SQL Server 2000 including; XML support, enhanced data-mining capabilities and integration with Windows 2000.

  • av Syngress
    817,-

    Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment. This work presents the hardware and software that comprise the Cisco IDS. It also covers Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs.

  • - Including IPv6
    av Syngress
    860,-

    Focuses on planning and configuring networks and devices for IP 6. This book covers how to: increase the IP address size from 32 bits to 128 bits; support more levels of addressing hierarchy; support an increased number of addressable nodes; and, support simpler auto-configuration of addresses.

  • av Syngress
    645,-

    TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. This book teaches how to prevent, detect, troubleshoot and correct TCP/IP network problems. It focuses on identifying problem areas, including correcting protocol errors, DNS route problems, application faults and slow response times.

  • av Syngress
    611,-

    Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations. This book provides step-by-step instructions on how to install and deploy a fixed wireless network.

  • - Building Multi Protocol Label Switching Networks
    av Syngress
    817,-

    Introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. This book discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, and more.

  • av Syngress
    824,-

    Covers major Cisco Internetworking concepts and configurations. This book offers cross reference to Cisco internetworking topics that include: Voice Over IP, Remote Access, Wireless, AVVID, and QoS. It also covers technologies that include: AVVID, SIP, MGCP, and more.

  • av Syngress
    919,-

    Offers coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network. This book covers: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; and, supporting an increased number of addressable nodes.

  • av Syngress
    714,-

    Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and SonicWall. This work describes what features can be controlled by a policy, and presents the reader the steps for writing the policy to fit the objective.

  • av Syngress
    860,-

    Teaches system administrators how to configure, deploy, and troubleshoot "Symantec Enterprise Edition" in an enterprise network. This book reflects Symantec's philosophy of 'Centralized Antivirus Management'. It provides system administrators with a holistic approach to defending their networks from malicious viruses.

  • av Syngress
    714,-

    Bluetooth is the most exciting development in wireless computing. This title provides embedded applications developers with advanced tutorials and code listings written to the Bluetooth's specification, version 1.1.

  • av Syngress
    697,-

    A guide to protecting your Windows 2000 Network. It covers methods of attack and hacker secrets. It is suitable for IT professionals who want to run secure networks, or build secure software.

  • av Syngress
    645,-

    A guide to Ruby, a popular Object-Oriented Programming Language. It is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. It helps readers learn how to develop, implement, organize and deploy applications using Ruby.

  • av Syngress
    817,-

    Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN, and management solutions. This title lets you understand NGX R65 operational changes. It features SVN architecture, VPN-1 features, and VPN-1 Power VSX. It tells how to deploy SmartClients and SmartManagement.

  • - Amazing Projects You Can Build in Under an Hour
    av Syngress
    388,-

    Lego Mindstorms lets you design and program robots that can do just about anything. This illustrated title provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies. It is specifically targeted at new users of the Lego Mindstorms RIS 2.0.

  • - Case Studies for Implementing the NSA IAM
    av Syngress
    971,-

    The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. This book shows how to do a complete security assessment based on the NSA's guidelines.

  • av Syngress
    860,-

    Includes coverage of the additions to the PIX Firewall family, including the CiscoSecure PIX Firewall (PIX) Software Release 6.0. This guide instructs the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting, and more.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.