Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Active Defense: A Comprehensive Guide to Network Security

Buy
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead of mischief and thievery. Active
Defense: A Comprehensive Guide to Network Security gives you precisely the
knowledge and expertise you're looking for. You'll work smarter by day, and
sleep easier by night.

Coverage includes:
• Configuring Cisco router security features
• Selecting and configuring a firewall
• Configuring an Intrusion Detection System
• Providing data redundancy
• Configuring a Virtual Private Network
• Recognizing hacker attacks
• Getting up-to-date security information
• Locking down Windows NT and 2000 servers
• Securing UNIX, Linux, and FreeBSD systems
• Protecting NetWare servers from attack

About the Authors
Chris Brenton is a network consultant specializing in network security and
multiprotocol environments. He is the author of several Sybex books,
including Mastering Cisco Routers.
Cameron Hunt is a network professional specializing in information security.
He has worked for the U.S. military and a wide range of corporations. He
currently serves as a trainer and consultant.
(HTML tags aren't allowed.)

Aspect-Oriented Analysis and Design: The Theme Approach
Aspect-Oriented Analysis and Design: The Theme Approach

"Developers who are using aspect-oriented programming will appreciate this contribution to aspect-oriented analysis and design. The authors are pioneers in this area and have elaborated on past research to produce a detailed methodology and notation for early aspects."

Ron Bodkin, Chief...

Ballantine Books.How to Wow: Proven Strategies for Presenting Your Ideas, Persuading Your Audience, and Perfecting Your Image
Ballantine Books.How to Wow: Proven Strategies for Presenting Your Ideas, Persuading Your Audience, and Perfecting Your Image

“The invaluable advice in How to Wow guarantees your success in any meeting situation, from the boardroom to the breakfast table.”
–Keith Ferrazzi, author of Never Eat Alone

In today’s fast-paced world, where an elevator ride with your CEO can turn into an impromptu meeting, your lunch
...

Pattern Recognition and Classification: An Introduction
Pattern Recognition and Classification: An Introduction

The use of pattern recognition and classification is fundamental to many of the automated electronic systems in use today. However, despite the existence of a number of notable books in the field, the subject remains very challenging, especially for the beginner.

Pattern Recognition and Classification presents a comprehensive
...


Experience Skype to the Max: The Essential Guide to the World's Leading Internet Communications Platform
Experience Skype to the Max: The Essential Guide to the World's Leading Internet Communications Platform

Experience Skype to the Max shows you how to make the most of Skype's full range of features on any device. Discover tips and tricks for saving time, saving money, and fostering better communication at work or in your personal projects.

Go beyond simple voice calling and discover Skype as a multimedia cross-platform...

Philosophical Presentations of Raising Children: The Grammar of Upbringing
Philosophical Presentations of Raising Children: The Grammar of Upbringing

This book uses contemporary film to articulate a philosophical account of raising children. It forms part of a revaluation of the parent as a pedagogical figure, which stands in contrast to the instrumental accounts dominant in contemporary ‘parenting’ culture. Hodgson and Ramaekers use film in order to offer an...

Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy