Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Firewall Fundamentals
  • Language: en
  • Pages: 497

Firewall Fundamentals

The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and...

Designing and Building Enterprise DMZs
  • Language: en
  • Pages: 737

Designing and Building Enterprise DMZs

  • Type: Book
  • -
  • Published: 2006-10-09
  • -
  • Publisher: Elsevier

This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and...

CISSP Training Guide
  • Language: en
  • Pages: 768

CISSP Training Guide

The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. This book maps the exam objectives and offers numerous features such as exam tips, case studies, and practice exams.

Virtualization for Security
  • Language: en
  • Pages: 378

Virtualization for Security

  • Type: Book
  • -
  • Published: 2009-02-24
  • -
  • Publisher: Syngress

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic a...

Network Infrastructure Security
  • Language: en
  • Pages: 274

Network Infrastructure Security

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised. Network Infrastructure Security bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.

Hacking Exposed Computer Forensics
  • Language: en
  • Pages: 484

Hacking Exposed Computer Forensics

Whether retracing the steps of a security breach or tracking down high-tech crime, this complete package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in court. The bonus CD-ROM contains the latest version of each of the forensic tools covered in the book and evidence files for real-time investigation.

Secure Your Network for Free
  • Language: en
  • Pages: 509

Secure Your Network for Free

  • Type: Book
  • -
  • Published: 2011-04-18
  • -
  • Publisher: Elsevier

This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn't want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software. - Teachers you how to implement best of breed security using tools for free - Ideal for anyone recomending and implementing new technologies within the company

Hacking Exposed Cisco Networks
  • Language: en
  • Pages: 652

Hacking Exposed Cisco Networks

Focusing solely on Cisco network hacking, security auditing and defense issues, this book features all tools and code necessary to properly audit the security of Cisco network architecture.

Effective Oracle Database 10g Security by Design
  • Language: en
  • Pages: 546

Effective Oracle Database 10g Security by Design

Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. “In my experience in the security world, including 32 years at the Central Intelligence Agency, I’ve not found anyone with more experience in the theory and practice of protecting your data than David Knox.” --Dave Carey, former Executive Director of the CIA

Hardening Linux
  • Language: en
  • Pages: 450

Hardening Linux

This title shows network administrators and IT pros how to harden the Linux system against hackers.