You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crip...
Explains what Weblogs are and the technology behind them, covering such topics as the components of a blog and a blog post, desktop blogging, using templates to customize blogs, and syndicating stories with RSS.
As the son of two Jungian therapists, the young Micah Toub got a double dose of insight, ranging from the flaky to the profound. Dreamwork, archetypes, conflict resolution, the mind-body connection--Toub's childhood was a virtual laboratory of psychology. Enriched with excerpts from Carl Jung's own memoir, and informed by readings and conversations with Jungian gurus and unbelievers alike, Growing Up Jung examines the pros and cons of Jungian philosophy while tackling the question: is it possible for the spawn of two shrinks to reach adulthood mentally unscathed?
Presents an illustrated A-Z encyclopedia containing approximately 600 entries on computer and technology related topics.
"The Ultimate Halloween Trivia Book, 2nd edition" is the ultimate horror trivia book for the ultimate horror fans. This updated version (2nd edition) of the original "The Ultimate Halloween Trivia Book" has included multiple new content, including a brand new chapter (the 11th chapter) on the 2018 Halloween film, as well as an addition of a word search to the Halloween Mashup chapter, which is now the 12th chapter.It has been updated to 12 chapters and 1300 trivia questions, tying the author of this book's other book, "The Ultimate Friday the 13th Trivia Book" with the most trivia questions in any horror genre trivia book ever created. The first 11 chapters are 100 multiple choice questions,...
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how ...
Computer System Security: Basic Concepts and Solved Exercises is designed to expose students and others to the basic aspects of computer security. Written by leading experts and instructors, it covers e-mail security; viruses and antivirus programs; program and network vulnerabilities; firewalls, address translation and filtering; cryptography; secure communications; secure applications; and security management. Written as an accompanying text for courses on network protocols, it also provides a basic tutorial for those whose livelihood is dependent upon secure systems. The solved exercises included have been taken from courses taught in the Communication Systems department at the EPFL. .
This practical guidebook explains not only how to get a computer up and running with the FreeBSD operating system, but how to turn it into a highly functional and secure server that can host large numbers of users and disks, support remote access and provide key parts of the Inter
While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database that allows us to identify machines by name. DNS does the work of translating domain names into numerical IP addresses, routing mail to its proper destination, and many other services, so that users require little or no knowledge of the system. If you're a network or system administrator, however, configuring, implementing, and maintaining DNS zones can be a formidable challenge. And now, with Windows Server 2003, an understanding of the workings of DNS is even more critical. DNS on Windows Server...