Account
Orders
Advanced search
Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft,...
This book covers Exam 200-14 in great detail, digging into some of the most important details involved in locking down Windows systems and networks and taking a systemic approach to keeping Windows networks and systems secured.Boasting a one-of-a-kind integration of...
Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential? Thanks to soaring e-business initiatives and worldwide Internet connectivity, recent survey...
Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam...
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar.The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks.The problem for the Microsoft network administrators and engineers is...
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features...
Configuring Cisco Voice Over IP, Second Edition provides network administrators with a thorough understanding of Cisco's current voice solutions. This book is organized around the configuration of all of Cisco's core VoIP products, including Cisco CallManager software,...
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite ofSniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely usedSniffer Product -Sniffer Pro LAN Network...
The only way to stop a hacker is to think like one!The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML...
"By building IPv6 into Cisco IOS software, we are enabling continued growth of the Internet and its expansion into new applications and capabilities in a way that maintains compatibility with existing Internet services." -- Stephen Deering, Cisco Fellow and lead...
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has given us a new type of criminal...
Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. Developing .Net Web Services with XML introduces readers to the...
The Holy War between Microsoft Corporation and Sun Microsystems is heating up as Sun unveils JAX Pack to compete with Microsoft's .NET initiativeJAX Pack is an all-in-one development kit that utilizes XML to build cross platform Web services. For companies that are...
Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-on instruction...
Enable enterprise-wide information access using Cisco wireless networksWireless networks are rapidly becoming a viable alternative to traditional wired LANs (Local Area Networks), mainly because of the convenience they provide. By implementing a wireless network,...
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems...
Syngress's best-selling Citrix MetaFrame author to deliver world class support for this new product As the newest member of the Citrix MetaFrame product family, Citrix MetaFrame XP and recent add-on Feature Release 1 is making a slash in the IT community. Configuring...
The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a...
Compete with the big players in today's E-commerce marketplaceElectronic Data Interchange (EDI) has long been the standard for large business enterprises to communicate in the B2B marketplace. However, EDI is a difficult technology - the cost and support of EDI...
Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers