Télécharger le livre :  Configuring Juniper Networks NetScreen and SSG Firewalls
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to...

Editeur : Syngress
Parution : 2006-12-08
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Syngress Force Emerging Threat Analysis
A One-Stop Reference Containing the Most Read Topics in the Syngress Security LibraryThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise...

Editeur : Syngress
Parution : 2006-11-08
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WarDriving and Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that...

Editeur : Syngress
Parution : 2006-11-08
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Scripting VMware Power Tools: Automating Virtual Infrastructure Administration
This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail...

Editeur : Syngress
Parution : 2006-11-07
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hack the Stack
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found...

Editeur : Syngress
Parution : 2006-11-06
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Enemy at the Water Cooler
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and...

Editeur : Syngress
Parution : 2006-10-30
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the...

Editeur : Syngress
Parution : 2006-10-13
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a VoIP Network with Nortel's Multimedia Communication Server 5100
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview...

Editeur : Syngress
Parution : 2006-08-31
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing...

Editeur : Syngress
Parution : 2006-08-22
PDF sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dictionary of Information Security
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms used in...

Editeur : Syngress
Parution : 2006-08-18
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Combating Spyware in the Enterprise
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently...

Editeur : Syngress
Parution : 2006-08-04
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Video Conferencing over IP: Configure, Secure, and Troubleshoot
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video...

Editeur : Syngress
Parution : 2006-06-07
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  RFID Security
RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Editeur : Syngress
Parution : 2006-05-25
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring SonicWALL Firewalls
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. TheSonicWALL firewall appliance has had the largest annual growth in the security...

Editeur : Syngress
Parution : 2006-05-25
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical VoIP Security
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the...

Editeur : Syngress
Parution : 2006-03-31
PDF sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Configuring ISA Server 2004
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be...

Editeur : Syngress
Parution : 2006-03-16
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Microsoft Operations Manager 2005
Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever...

Editeur : Syngress
Parution : 2006-03-01
PDF sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Foundations
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...

Editeur : Sybex
Parution : 2006-02-20
PDF

24,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Editeur : Syngress
Parution : 2006-02-08
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Log Management
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing...

Editeur : Syngress
Parution : 2006-01-27
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
<< < 2829303132 >