Learn how to protect your network with this guide to building complete and fully functional network security tools Although open source network securi...
This text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installatio...
This network version of the popular Internet WatchDog allows the employer to monitor and record all computer activity -- (even OFF the Internet) by ...
Whom can you trust? Try Bruce Schneier, whose rare gift for common sense makes his book Secrets and Lies: Digital Security in a Networked World both e...
Book DescriptionConfiguring Check Point NGX VPN-1/FireWall-1 is the perfect reference for anyone migrating from earlier versions of Check Point's flag...
Experts from the world's major financial institutions contributed to this work and have already used the newest technologies. Gives proven strategies...
Your Complete Guide to Cisco Enterprise IDS Management This book presents a combination of intrusion detection systems (IDS) and security theory, Ci...
According to MCP Magazine, there were over 200,000 current Windows 2000 Server MCSEs at the beginning of 2003, and an additional 1.2 million MCP looki...
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as...
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be ...
How does anonymity enable free speech-and how is it a threat? "I think anonymity on the Internet has to go away," famously said by Randi Zuckerberg ...
Syngress knows what passing the exam means to you and to your career. And we know that you are often financing your own training and certification; t...
Prevent hacker exploits with this comprehensive implementation guide You?re ready to see through the misconceptions and misinformation about NAP/NAC t...
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptogra...
* Get ready for some down-and-dirty hackin'! Over 200 serious hacks readers can use to force Windows XP to do it their way, written in the ExtremeTec...
Kevin David Mitnick was cyberspace's most wanted hacker. Mitnick could launch missiles or cripple the world's financial markets with a single phone ca...
This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, l...
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensiv...
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover...
Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices li...
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call ...
Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, a...