You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Technology You Need is Out There. The Expertise You Need is in Here. Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technology, but it does much more than bring you up to date. More importantly, it gives you a comprehensive understanding of the threats to your organization's network and teaches you a systematic approach in which you make optimal use of the technologies available to you. Coverage includes: Understanding security from a topological perspective Configuring Cisco router security features Selecting and configuring a firewall Configuring Cisco's PIX firewall Configuring an intrusion detection system Providing data redundancy Configuring a Virtual Private Network Securing your wireless network Implementing authentication and encryption solutions Recognizing hacker attacks Detecting and eradicating viruses Getting up-to-date security information Locking down Windows NT/2000/XP servers Securing UNIX, Linux, and FreBSD systems
The perfect introduction for getting up and running and getting the most out of your iMac Apple's iMac is a sleek, all-in-one desktop. In a clear, easy-to-follow visual format, Teach Yourself VISUALLY iMac demonstrates everything you need to know about your new Apple iMac, from the iMac's features and capabilities to the most common peripherals you'll be using with it. Whether you're a total newbie to Macs and the Mac OS or an experienced user looking for expert tips to improve your experience, this book is your perfect guide. Takes you through the basics to get up and running with the iMac's plug-and-play simplicity Walks you through setting up a customized desktop, working with the OS, wor...
Master the Technology That Enables You to Master Network Management Active Directory represents an enormous advance in network administration. It provides a vast set of powerful tools and technologies for managing a network within a native Windows environment. Mastering Active Directory for Windows Server 2003 is the resource you need to take full advantage of all it has to offer. You get a sound introduction to network directory services, then detailed, practical instruction in the work of implementing Active Directory and using all of its tools. This edition has been completely updated to address features new to Active Directory for Windows Server 2003. Coverage includes: Understanding the...
Security issues are at an all-time high. This volume provides updated, comprehensive, platform-by-platform coverage of security issues, and includes to-the-point descriptions of techniques hackers use to penetrate systems. This book provides information for security administrators interested in computer and network security and provides techniques to protect their systems.
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides: Clear and concise information on administering a secure Windows Server 2003 network Practical examples and insights drawn from real-world experience Leading-edge exam preparation software, including a testing engine and electronic flashcards for your Palm You'll also find authoritative coverage of key exam topics, including: Implementing, Managing, and Troubleshooting Security Policies Implementing, Managing, and Troubleshooting Patch Management Infrastructure Implementing, Managing, and Troubleshooting Security for Network Communications Planning, Configuring, and Troubleshooting Authentication, Authorization, and PKI Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud su...
Get ready to pass the CISSP exam and earn your certification with this advanced test guide Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers, you'll gain a better understanding of the key concepts associated with the ten domains of the common body of knowledge (CBK). Each question is designed to test you on the information you'll need to know in order to pass the exam. Along with explanations of the answers to these advanced questions, you'll find discussions on some common incorrect responses as well. In addi...
Here's the book you need to prepare for Exam 70-219, Designing a Microsoft Windows 2000 Directory Services Infrastructure: In-depth coverage of every exam objective Practical information on designing a Directory Services infrastructure Hundreds of challenging review questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine and electronic flashcards Authoritative coverage of all exam objectives, including: Analyzing business requirements Analyzing technical requirements Designing a Directory Service architecture Designing service locations Analyzing desktop management business requirements Designing and planning the OU structure Planning for coexistence of Active Directory and other directory services Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival of their business. A perfect example of this is Enron. Enron's ultimate failure due to a glitch in the ethics systems of the business created the most infamous example of an ethics corporate breakdown resulting in disaster. Ethics is no longer a matter of morals anymore when it comes to information security; it is also a matter of success or failure for big business.* This groundbreaking book takes on the difficult ethical issues that IT professional confront every day.* The book provides clear guidelines that can be readily translated into policies and procedures.* This is not a text book. Rather, it provides specific guidelines to System Administrators, Security Consultants and Programmers on how to apply ethical standards to day-to-day operations.