Home | Amazing | Today | Tags | Publishers | Years | Search 
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

The term WarDriving originates from WarDialing, a term introduced to the public by Matthew Broderick's character, David Lightman, in the 1983 movie "WarGames." WarDialing is the practice of using a modem attached to a computer to dial an entire exchange of telephone numbers to locate any computers with modems attached to them....

IP Addressing and Subnetting, Including IPv6
IP Addressing and Subnetting, Including IPv6
This book covers every aspect of the current version, as well as what will be a widespread migration starting in late 1999. These include: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy and an increased number of addressable nodes; supporting simpler auto-configuration of addresses;...
Ethereal Packet Sniffing
Ethereal Packet Sniffing

Ethereal offers more protocol decoding and reassembly than any free sniffer out there and ranks well among the commercial tools. You’ve all used tools like tcpdump or windump to examine individual packets, but Ethereal makes it easier to make sense of a stream of ongoing network communications. Ethereal not only makes network...

MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
This book’s primary goal is to help you prepare to take and pass Microsoft’s exam number
70-290, Managing and Maintaining a Microsoft Windows Server 2003 Environment. Our secondary
purpose in writing this book is to provide exam candidates with knowledge and
skills that go beyond the minimum requirements for passing the
...
The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
Dr. Tom Shinder's Configuring ISA Server 2004
Dr. Tom Shinder's Configuring ISA Server 2004

This book is based in large part on our own trials and tribulations (as well as the occasional “Eureka!” moment) that we’ve experienced working with ISA Server 2004. In this book, we are talking to people much like ourselves—experienced Windows network administrators who want to secure their networks and speed up Web...

MCSA/MCSE Exam 70-291 Study Guide and Training System: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
MCSA/MCSE Exam 70-291 Study Guide and Training System: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
All of Microsoft’s published objectives for the
MCSA/MCSE 70-291 Exam are covered in this book.
To help you easily find the sections that directly
support particular objectives, we’ve listed all of the
exam objectives below, and mapped them to the
Chapter number in which they are covered. We’ve
also
...
Nessus Network Auditing (Jay Beale's Open Source Security)
Nessus Network Auditing (Jay Beale's Open Source Security)

Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, many of whom rely on Nessus as the foundation to their security practices. Now, Nessus Project Founder Renaud Deraison and...

Inside the Spam Cartel
Inside the Spam Cartel

Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and...

SSCP Study Guide and DVD Training System
SSCP Study Guide and DVD Training System

The SSCP Study Guide is a one-of-a-kind text and Web-based stimulation and remediation. The system gives you 100% coverage of the official International Information Systems Security Certification Consortium, Inc. (ISC)

  • Completely Guaranteed Coverage of All Exam Objectives: All seven SSCP domains are covered in full;...
Check Point NG/AI: Next Generation with Application Intelligence Security Administration
Check Point NG/AI: Next Generation with Application Intelligence Security Administration

In Check Point Next Generation with Application Security Administration you will cover the basic concepts of security and how to configure a simple firewall all the way to some very advanced VPN scenarios. This book is written by experts in the field as well as certified instructors to give the depth desired by the most advanced users,...

Rick Gallaher's MPLS Training Guide: Building Multi Protocol Label Switching Networks
Rick Gallaher's MPLS Training Guide: Building Multi Protocol Label Switching Networks

Many large to mid-size enterprise and private networks are examining the benefits of MPLS. The biggest benefit of migrating to MPLS is the savings that it promises through convergence and additional services. MPLS offers the ability to construct a scalable network that can handle data, voice, and video conferencing. The cry from CTOs around the...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy