Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. This book details the requirements for such a project, and includes sample forms and templates, and delivers several physical to virtual migration strategies.
Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.
NetScreen is a firewall appliance. This book offers a look at the NetScreen firewall product line. It features various aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. It also covers advanced troubleshooting techniques and the NetScreen Security Manager.
Microsoft Operations Manager is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. This work delivers open and scalable enterprise-class operational management by providing event management, proactive monitoring and alerting, reporting and trend analysis, and more.
Teaches IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. This book begins by identifying the types of insiders who are most likely to pose a threat.
Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members. Skype's Application Programming Interface (API) allows users to develop their own applications. This book helps the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC.
Protect your network from both internal and external threats. Check Point NGX VPN-1/Firewall-1 is a Check Point's flagship firewall software product. This book provides coverage of features of this product, allowing 3rd party partners to certify NGX add-on products quickly.
Focusing completely on infrastucture security: network devices, protocols and architectures, this book offers coverage of network design so administrators understand how they should design and protect their enterprises.
Provides an introduction to the field of Intrusion Prevention and offers detailed information on various IPS methods and technologies. This book covers specific methods, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, and session sniping.
Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and SonicWall. This work describes what features can be controlled by a policy, and presents the reader the steps for writing the policy to fit the objective.
Deals with the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. This book provides professional penetration testers and security researchers with an integrated suite of tools for discovering, running, and testing exploit code.
Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of insidious spyware and adware propagating across the internet and infiltrating enterprise networks. It reveals spyware's intricate economy and network of malicious hackers and criminals.
De-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.
Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application developers to defend their applications. This book defines Web application security, why it should be addressed in the lifecycle in development and quality assurance, and how it differs from other types of Internet security.
Written by an expert on Installing, Configuring, Managing and Troubleshooting ISA Server, this book can be used as a quick reference to ISA Server. It includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation.
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.
Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. This book pinpoints the important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively.
Covers Citrix MetaFrame Presentation Server 3.0 and Windows Server 2003 Terminal Services. This book shows how to manage applications from a central location and access them from anywhere, and also how to build scalable, flexible, and secure access solutions that reduce computing costs and increase the utility of your network.
Teaches system administrators how to configure, deploy, and troubleshoot "Symantec Enterprise Edition" in an enterprise network. This book reflects Symantec's philosophy of 'Centralized Antivirus Management'. It provides system administrators with a holistic approach to defending their networks from malicious viruses.
A guide to deploying Voice Over IP (VoIP) products. It begins with a discussion of the protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks.
Describes the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. This book introduces the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak. The companion web site includes many working scripts.
The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification exam. It is useful as a study guide, as well as a professional reference.
Features the "80/20" Rule applied to managing a Windows Small Business Server 2003 network. This book offers concise coverage, with ready-to-use solutions, of the most commonly encountered W2K3 Server tasks and problems. It is written for the non-MCSE, with little technical training, who is responsible for running a small to medium sized network.
Bluetooth is the most exciting development in wireless computing. This title provides embedded applications developers with advanced tutorials and code listings written to the Bluetooth's specification, version 1.1.
Provides a concise system for managing IT projects, regardless of the size or complexity of the project. This work offers a fresh approach to IT project management, combining strategic business concepts with the practical instructions for developing and managing a successful IT project.
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This book offers a look at the SonicWALL firewall product line. It covers various aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls.
A guide to protecting your Windows 2000 Network. It covers methods of attack and hacker secrets. It is suitable for IT professionals who want to run secure networks, or build secure software.
A guide to Ruby, a popular Object-Oriented Programming Language. It is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. It helps readers learn how to develop, implement, organize and deploy applications using Ruby.
Details the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. This work discusses the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort.
Tackles one of the fastest growing crimes in the world: identity theft. This book features real-world network attack methodologies and hacking techniques within a context of original fictional accounts.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.