Utvidet returrett til 31. januar 2025

Bøker utgitt av Syngress Media,U.S.

Filter
Filter
Sorter etterSorter Populære
  • - Including Vmware, Xen, and Microsoft Virtual Server
    av Rogier (MCSE NT4 Dittner
    851,-

    Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. This book details the requirements for such a project, and includes sample forms and templates, and delivers several physical to virtual migration strategies.

  • av James Foster
    707,-

    Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.

  • av Rob (Security Solutions Engineer for Juniper Networks Cameron
    673,-

    NetScreen is a firewall appliance. This book offers a look at the NetScreen firewall product line. It features various aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. It also covers advanced troubleshooting techniques and the NetScreen Security Manager.

  • av Anthony Piltzecker
    504,-

    Microsoft Operations Manager is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. This work delivers open and scalable enterprise-class operational management by providing event management, proactive monitoring and alerting, reporting and trend analysis, and more.

  • av Eric Cole
    521,-

    Teaches IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. This book begins by identifying the types of insiders who are most likely to pose a threat.

  • av Markus Daehne
    521,-

    Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members. Skype's Application Programming Interface (API) allows users to develop their own applications. This book helps the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC.

  • av Barry J (Founder and President of CPUG Stiefel
    707,-

    Protect your network from both internal and external threats. Check Point NGX VPN-1/Firewall-1 is a Check Point's flagship firewall software product. This book provides coverage of features of this product, allowing 3rd party partners to certify NGX add-on products quickly.

  • av Steven Andres
    851,-

    Focusing completely on infrastucture security: network devices, protocols and architectures, this book offers coverage of network design so administrators understand how they should design and protect their enterprises.

  • - Deploying Network and Host IPS
    av Michael Rash
    707,-

    Provides an introduction to the field of Intrusion Prevention and offers detailed information on various IPS methods and technologies. This book covers specific methods, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, and session sniping.

  • av Syngress
    707,-

    Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and SonicWall. This work describes what features can be controlled by a policy, and presents the reader the steps for writing the policy to fit the objective.

  • av David (Senior Researcher Maynor
    809,-

    Deals with the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. This book provides professional penetration testers and security researchers with an integrated suite of tools for discovering, running, and testing exploit code.

  • - Discover, Detect, and Eradicate the Internet's Greatest Threat
    av Paul (Director of Threat Research for Webroot Piccard
    707,-

    Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of insidious spyware and adware propagating across the internet and infiltrating enterprise networks. It reveals spyware's intricate economy and network of malicious hackers and criminals.

  • av Michael (Computer security consultant Gough
    707,-

    De-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.

  • av Michael Cross
    707,-

    Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application developers to defend their applications. This book defines Web application security, why it should be addressed in the lifecycle in development and quality assurance, and how it differs from other types of Internet security.

  • av Debra (MCSE Littlejohn Shinder
    470,-

    Written by an expert on Installing, Configuring, Managing and Troubleshooting ISA Server, this book can be used as a quick reference to ISA Server. It includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation.

  • - From Mischief to Malicious
    av Robert (Chief Scientist of Internet Security Systems Graham
    707,-

    An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.

  • av Brien (Freelance technical writer Posey
    851,-

    Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. This book pinpoints the important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively.

  • av Melissa (Vice President of Dane Holdings Craft
    639,-

    Covers Citrix MetaFrame Presentation Server 3.0 and Windows Server 2003 Terminal Services. This book shows how to manage applications from a central location and access them from anywhere, and also how to build scalable, flexible, and secure access solutions that reduce computing costs and increase the utility of your network.

  • av Syngress
    851,-

    Teaches system administrators how to configure, deploy, and troubleshoot "Symantec Enterprise Edition" in an enterprise network. This book reflects Symantec's philosophy of 'Centralized Antivirus Management'. It provides system administrators with a holistic approach to defending their networks from malicious viruses.

  • av Larry (CEO/Chairman of Pluto Networks & Vice President of Advanced Network Technologies Chaffin
    851,-

    A guide to deploying Voice Over IP (VoIP) products. It begins with a discussion of the protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks.

  • av Dave (International Association of Counter Terrorism and Security Professionals Kleiman
    707,-

    Describes the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. This book introduces the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak. The companion web site includes many working scripts.

  • - Configure / Manage / Troubleshoot
    av Umer Khan
    707,-

    The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification exam. It is useful as a study guide, as well as a professional reference.

  • - In the Land of the Blind, the One-Eyed Man is King
    av Susan (MCSE Snedaker
    639,-

    Features the "80/20" Rule applied to managing a Windows Small Business Server 2003 network. This book offers concise coverage, with ready-to-use solutions, of the most commonly encountered W2K3 Server tasks and problems. It is written for the non-MCSE, with little technical training, who is responsible for running a small to medium sized network.

  • av Syngress
    707,-

    Bluetooth is the most exciting development in wireless computing. This title provides embedded applications developers with advanced tutorials and code listings written to the Bluetooth's specification, version 1.1.

  • av Susan (MCSE Snedaker
    656,-

    Provides a concise system for managing IT projects, regardless of the size or complexity of the project. This work offers a fresh approach to IT project management, combining strategic business concepts with the practical instructions for developing and managing a successful IT project.

  • av Dan (President of Assurance Technology Managment Bendell
    707,-

    SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This book offers a look at the SonicWALL firewall product line. It covers various aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls.

  • av Syngress
    690,-

    A guide to protecting your Windows 2000 Network. It covers methods of attack and hacker secrets. It is suitable for IT professionals who want to run secure networks, or build secure software.

  • av Syngress
    639,-

    A guide to Ruby, a popular Object-Oriented Programming Language. It is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. It helps readers learn how to develop, implement, organize and deploy applications using Ruby.

  • av Al (Senior Consultant for SBC\Callisma) Muller
    639,-

    Details the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. This work discusses the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort.

  • av Ryan (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.) Russell
    588,-

    Tackles one of the fastest growing crimes in the world: identity theft. This book features real-world network attack methodologies and hacking techniques within a context of original fictional accounts.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.