Компьютеры и Internet
  • 0
admin
Building Open Source Network Security Tools: Components and Techniques, Mike Schiffman, Mike SchiffmanLearn how to protect your network with this guide to building complete and fully functional network security tools
Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area - - whether its additional functionality, a specific feature, or a narrower scope.
Компьютеры и Internet
  • 0
admin
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security, Debra S. Isaac, Michael J. Isaac* SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create
Компьютеры и Internet
  • 0
admin
HackNotes(tm) Network Security Portable Reference, Michael Horton, Clinton MuggeHere#8217;s the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architecture solutions.
Компьютеры и Internet
  • 0
admin
The Tao of Network Security Monitoring : Beyond Intrusion DetectionWelcome to The Tao of Network Security Monitoring: Beyond Intrusion Detection . The goal of this book is to help you better prepare your enterprise for the intrusions it will suffer.
Компьютеры и Internet
  • 0
admin
CCSP Self-Study : Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Certification Self-Study Series), Earl Carter
  • Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies
  • Review techniques applicable to both network- and host-based platforms
  • Review the security wheel concepts and apply security to AVVIDusing the SAFE Blueprint
  • Install and configure the Cisco IDS to monitor your network for malicious activity
  • Understand Cisco Threat Response (CTR) benefits and how it operates
  • Apply alarm signatures and gain the proficiency to create your own custom signatures
  • Deploy Cisco IDS effectively in your network using sensor and management platforms
  • Get inside the Cisco Security Agent (CSA) architecture

Компьютеры и Internet
  • 0
admin
CCIE Security Practice Labs (CCIE Self-Study) (CCIE Self-Study). (+ CD-ROM), Fahim Hussain, Yusuf BhaijiSeven comprehensive CCIE security labs to hone configuration and troubleshooting skills
Prepare for the CCIE Security lab exam and hone your security configuration and troubleshooting skills with seven complete practice scenarios that cover:
Компьютеры и Internet
  • 0
admin
Steal This File Sharing Book, Wallace WangSteal This File Sharing Book tackles the thorny issue of file sharing networks such as Kazaa, Morpheus, and Usenet. It explains how these networks work and how to use them.
Компьютеры и Internet
  • 0
admin
Fixed Effects Regression Methods for Longitudinal Data Using SAS, Paul D. AllisonFixed Effects Regression Methods for Longitudinal Data Using SAS is an invaluable resource for all researchers interested in adding fixed effects regression methods to their tool kit of statistical techniques.
Компьютеры и Internet
  • 0
admin
GIS, Spatial Analysis, and ModelingA guide for geographic analysts, modelers, software engineers, and GIS professionals, this book discusses agent-based modeling, dynamic feedback and simulation modeling, as well as links between models and GIS software.
Компьютеры и Internet
  • 0
admin
Configuring CallManager and Unity: A Step-by-Step Guide, David BatemanP style=MARGIN: 0in 0in 0pt soNormalAn indispensable step-by-step configuration guide for IP Telephony professionalsA  UL LIIncludes step-by-step configuration instructions for CallManager features and Unity administration tasks LIDemonstrates how to deploy devices and implement your dial plan LICovers Call Admission Control features and class of service LIExamines different subscriber types and how subscribers are added, imported, and managed LIIncludes step-by-step instructions for call handling and auto attendant configuration LIDescribes how to use Unity and CallManager together to deliver unique features P style=MARGIN: 0in 0in 0pt soNormalTo properly deploy any type of technology, networking professionals must understand not only the technology but also how to configure and integrate it with other solutions.