Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.-
Computer networks --- Wide area networks (Computer networks) --- Access control. --- Security measures. --- Access. --- Access to wide area computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill
Computer network protocols. --- Computer networks --- Maintenance and repair. --- Management.
Choose an application
The only book dedicated Sniffer, a powerful tool created for real-time enterprise network fault diagnosis and performance management. Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Network Analyzer. This book will begin with the basic features of Sniffer Pro LAN and then move the reader through the impressive tips and tools available for gathering data, analyzing, troubleshooting
Network analysis (Planning) --- Debugging in computer science. --- Computer programs --- Troubleshooting in computer science --- Project networks --- Debugging --- Data editing --- Electronic data processing --- Planning --- Testing --- Software failures --- System analysis
Choose an application
MCSA/MCSE Exam 70-292 Study Guide & DVD Training System: Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-292 exam objectives plus test preparation software for the edge you need to pass the exam on your first try.In June, 2003 Microsoft will launch beta exams for the Windows Server 2003 certification line. Exams will likely go live the following Augu
Electronic data processing personnel --- Microsoft software --- Certification. --- Examinations --- Microsoft Windows server. --- Windows server --- Microsoft Windows 2000 server --- Windows server 2003 --- Windows Home Server --- Microsoft Windows Home Server --- Microsoft Windows NT server
Choose an application
Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discuss
Computer networks -- Security measures. --- Computer security. --- Electronic data processing departments -- Security measures. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Access control --- Security measures --- Hacktivism. --- Security measures. --- Information Technology --- General and Others --- Activism, Hacker --- Hacker activism --- Computer crimes --- Hacking --- Internet --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Political aspects --- Social aspects
Choose an application
This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of ""Centralized Antivirus Management."" For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.Configuring Symantec AntiVirus Enter
Computer viruses. --- Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Software viruses --- Viruses, Computer --- Security measures --- Protection of computer systems --- Protection --- Computer security --- Data protection --- Security systems --- Hacking --- Computer crimes --- Malware (Computer software)
Choose an application
The 11th Hour Network+ Study Guide is keyed to the N10-004 revision of the CompTIA Network+ exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentalsExam Warnings highlight particularly tough sections of the examCrunch Time sidebars point out key concepts to rememberDid You Know? sidebars cover sometimes forgotten detailsTop Fiv
Computer networks --- Electronic data processing personnel --- Examinations --- Certification. --- Information Technology --- General and Others
Choose an application
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ
Electronic intelligence. --- Internet in espionage. --- Cyber intelligence (Computer security) --- Internet --- Computer crimes. --- Security measures. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Espionage --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures
Choose an application
The Network+ Study Guide covers all the objectives on the CompTIA exam, including the features and functions of networking components, and ensuring that readers have the knowledge and skills needed to install, configure and troubleshoot basic networking hardware, protocols and services. It covers exam topics such as media and topologies, protocols and standards, network implementation, and network support, as well as new exam topics on technologies such as wireless networking and Ethernet.* Complete coverage of the new 2005 exam, written from the ground up * Competitively priced wi
Computer networks --- Electronic data processing personnel --- Microsoft software --- Examinations --- Certification.
Choose an application
The BizTalk 2000 Developer's Guide is written for developers who are responsible for installing, configuring and deploying the BizTalk Server in their organizations IT infrastructure. The opening chapters of the book discuss the benefits of seamless business-to-business application integration, summarize the features and enhancements of BizTalk Server 2000, and offer an introduction to XML - the driving force behind BizTalk. The next chapters explore the multiple tools that are incorporated into BizTalk that will transform the way in which information is created, transmitted and maintaine
Client/server computing. --- XML (Document markup language) --- Microsoft BizTalk server. --- Extendible Markup Language (Document markup language) --- eXtensible Markup Language (Document markup language) --- Computing, Client/server --- Microsoft Biz talk server --- BizTalk server --- Microsoft BizTalk server 2000 --- Document markup languages --- Electronic data processing --- Distributed processing
Listing 1 - 10 of 11 | << page >> |
Sort by
|