Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Hacks: Tips & Tools for Protecting Your Privacy

Buy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

(HTML tags aren't allowed.)

The Complete Idiot's Guide to Javascript
The Complete Idiot's Guide to Javascript
While it's doesn't cover JavaScript 1.1 as deeply as some other books, The Complete Idiot's Guide to JavaScript, Second Edition, offers a quick, to-the-point introduction to the subject. By the time you finish working through the explanatory text and examples, you'll know enough about JavaScript to create simple or moderately...
Fieldwork for Design: Theory and Practice (Computer Supported Cooperative Work)
Fieldwork for Design: Theory and Practice (Computer Supported Cooperative Work)
Fieldwork for Design looks at why ethnographic approaches have been turned to in the design of computing devices for the workplace, for the home and elsewhere. It presents a history of ethnography, both as it was practiced before computer science picked it up and since, most especially in the CSCW and HCI domains. It examines, further, the...
Numerical and Analytical Methods with MATLAB (Applied and Computational Mechanics)
Numerical and Analytical Methods with MATLAB (Applied and Computational Mechanics)

Numerical and Analytical Methods with MATLAB presents extensive coverage of the MATLAB programming language for engineers. It demonstrates how the built-in functions of MATLAB can be used to solve systems of linear equations, ODEs, roots of transcendental equations, statistical problems, optimization problems, control systems problems, and...


The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
XML Schemas
XML Schemas
To many XML believers and purists, there’s been a canker at the heart of the beautiful rose that is XML since its very inception. Worse still, some believe that canker was put there by design. That canker is, of course, the Document Type Definition, or DTD, that defines the very essence of XML. DTDs are “foreign imports” based on...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy