Narrow your search

Library

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

UGent (2)

Vlerick Business School (2)

VIVES (2)

VUB (2)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2005 (2)

Listing 1 - 2 of 2
Sort by
Configuring NetScreen Firewalls
Authors: --- --- --- ---
ISBN: 1281056227 9781597490148 9786611056223 0080476783 1597490148 1932266399 9781597490146 9781932266399 9780080476780 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Configuring NetScreen Firewalls covers all of the aspects of Juniper's NetScreen product line, from devices to Enterprise NetScreen firewalls. Coverage includes basic policy creation and administration, advanced troubleshooting techniques, the NetScreen Security Manager and VPN configuration. In addition, this book covers both the WebUI and the command line interface of NetScreen ScreenOS 5.0. as well as the NetScreen Security Manager (NSM). As a special bonus, Juniper Networks provides detailed coverage of the new features and enhancements included with ScreenOS 5.1.0.

Google Hacking for Penetration Testers
Authors: --- --- --- ---
ISBN: 1931836361 159749013X 9781597490139 9781931836364 9780080478050 0080478050 1281055948 9781281055941 9786611055943 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieve

Listing 1 - 2 of 2
Sort by