15 results - showing 1 - 10
1 2
Ordering
Guide to Securing Intranet and Extranet Servers
 
0.0 (0)
Ebooks May 28, 2022 3
As Intranets and Extranets have become more widely deployed, new security challenges have emerged. This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system:
Firewalls Complete by Marcus Goncalves
 
0.0 (0)
Ebooks May 24, 2022 4

Ebook Details

Author
Marcus Goncalves
Publisher
Mcgraw-Hill 1998
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
A Guide to Claims-Based Identity and Access Control by Dominick Baier, at al.
 
0.0 (0)
Ebooks May 23, 2022 2

Ebook Details

Author
Dominick Baier, at al.
Publisher
Microsoft Press 2010
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. 
Nmap Network Scanning by Gordon Fyodor Lyon
 
0.0 (0)
Ebooks May 23, 2022 3

Ebook Details

Author
Gordon Fyodor Lyon
Publisher
Nmap Project 2009
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration,
Snort Cookbook by A. Orebaugh, S. Biles, J. Babbin
 
0.0 (0)
Ebooks May 22, 2022 3

Ebook Details

Author
A. Orebaugh, S. Biles, J. Babbin
Publisher
O'Reilly Media 2005
Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, 
Internet Safety: Keeping your Computer Safe on the Internet by Leo Notenboom
 
0.0 (0)
Ebooks May 15, 2022 2

Ebook Details

Author
Leo Notenboom
Publisher
Puget Sound Software 2011
In this free 113 page e-book I summarize popular articles from Ask Leo! covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the...
Information Security and Privacy in Network Environments
 
0.0 (0)
Ebooks May 14, 2022 3

Ebook Details

Publisher
U.S. Government Printing Office 1994
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards and export controls; 2) guidance on safeguarding unclassified information in federal agencies; and 3) legal issues and information security, including electronic commerce, privacy, and intellectual property. ...
Ethical Hacking
 
0.0 (0)
Ebooks May 13, 2022 2

Ebook Details

Publisher
2014
Ethical hacking, which encompasses formal and methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with one major difference: Ethical hacking is performed with the target's permission in a professional setting.
Network Security Tools by Nitesh Dhanjani, Justin Clarke
 
0.0 (0)
Ebooks May 12, 2022 11

Ebook Details

Author
Nitesh Dhanjani, Justin Clarke
Publisher
O'Reilly Media, Inc. 2005
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools,
Firewalls and Internet Security: Repelling the Wily Hacker by William R. Cheswick, Steven M. Bellovin
 
0.0 (0)
Ebooks May 12, 2022 11

Ebook Details

Author
William R. Cheswick, Steven M. Bellovin
Publisher
Addison-Wesley 1994
The book gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
15 results - showing 1 - 10
1 2
0
Shares