-
Geopolitics and Expertise: Knowledge and Authority in European Diplomacy
Author Merje Kuus
Geopolitics and Expertise is an in-depth exploration of how expert knowledge is created and exercised in the external relations machinery of the European Union.Provides a rare, full-length work on transnational diplomatic practiceBased on a rigorous and empirical st....
Release Date 2014/03 -
Author Elaine Marmel
Let Sage Timeslips For Dummies show you how to turn your time into moneyIf you run a business that bills for its time, it's time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips inte....
Release Date 2014/03 -
Network Basics Companion Guide
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, f....
Release Date 2013/12 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Author Alexandre M.S.P Moraes
Cisco FirewallsConcepts, design and deployment for Cisco Stateful Firewall solutions¿“ In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully c....
Release Date 2011/06 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition
Author Omar Santos , Jazib Frahim - CCIE No. 5459
For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide t....
Release Date 2009/12 -
Building Expertise: Cognitive Methods for Training and Performance Improvement
Author Ruth Colvin Clark
This third edition of the classic resource, Building Expertise draws on the most recent evidence on how to build innovative forms of expertise and translates that evidence into guidelines for instructional designers, course developers and facilitators, technical com....
Release Date 2008/09 -
Cisco Secure Firewall Services Module (FWSM)
Author Arvind CCIE No. 7016 Durai , Ray CCIE No. 7050 Blair
Cisco Secure Firewall Services Module (FWSM)Best practices for securing networks with FWSMRay Blair, CCIE® No. 7050Arvind Durai, CCIE No. 7016The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 ....
Release Date 2008/08 -
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition
Author David Huca - CCIE No. 4594
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily config....
Release Date 2007/08 -
Author Andrew Mason
Cisco Firewall Technologies (Digital Short Cut)Andrew MasonISBN-10: 1-58705-329-2ISBN-13: 978-1-58705-329-0Cisco Firewall Technologies provides you with a no-nonsense, easy-to-read guide to different types of firewall technologies along with information on how these....
Release Date 2007/01 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02 -
Cisco ASA and PIX Firewall Handbook
Author Dave Huca
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security featuresLearn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall inter....
Release Date 2005/06 -
Author Chad Sullivan
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention SystemSecure your endpoint systems with host IPSBuild and manipulate policies for the systems you wish to protectLearn how to use groups and hosts....
Release Date 2005/06 -
SSH, The Secure Shell: The Definitive Guide, 2nd Edition
Author Robert G. Byrnes , Richard E. Silverman , Daniel J. Barrett
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implement....
Release Date 2005/05 -
Securing Your Business with Cisco ASA and PIX Firewalls
Author Greg Abelar
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occurLearn about the defense-in-depth model for deploying firewall and host protectionExamine naviga....
Release Date 2005/05 -
A Practical Guide to Security Assessments
Author Sudhanshu Kairab
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this w....
Release Date 2004/09 -
Cisco Router Firewall Security
Author Richard A. Deal
Harden perimeter routers with Cisco firewall functionality and features to ensure network securityDetect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniquesUse Network-Based Application Re....
Release Date 2004/08 -
Routing, Flow, and Capacity Design in Communication and Computer Networks
Author Deep Medhi , Michal Pioro
In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have bee....
Release Date 2004/07 -
Principles and Practices of Interconnection Networks
Author Brian Patrick Towles , William James Dally
One of the greatest challenges faced by designers of digital systems is optimizing the communication and interconnection between system components. Interconnection networks offer an attractive and economical solution to this communication crisis and are fast b....
Release Date 2004/03 -
CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA), Second Edition
Author Behzad Behtash
Cisco authorized self-study book for CCSP 642-521 foundation learningGain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and moreLearn the ins and outs of the PIX product family and its complete feature setUse the PIX....
Release Date 2004/01 -
Author Thomas Akin
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco ro....
Release Date 2002/02