-
Author Elaine Marmel
Let Sage Timeslips For Dummies show you how to turn your time into moneyIf you run a business that bills for its time, it's time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips inte....
Release Date 2014/03 -
Identity and Data Security for Web Development
Author Tim Messerschmidt , Jonathan LeBlanc
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without r....
Release Date 2016/06 -
Check Point Firewall Administration R81.10+
Author Vladimir Yakovlev , Dameon D. Welch
Improve your organization's security posture by performing routine administration tasks flawlesslyKey FeaturesGet a gradual and practical introduction to Check Point firewallsAcquire the knowledge and skills necessary for effective firewall administration, maintenance, and troubleshootingCreate and....
Release Date 2022/08 -
Author Chad Russell
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security....
Release Date 2018/04 -
A Practical Guide to Security Assessments
Author Sudhanshu Kairab
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this w....
Release Date 2004/09 -
Sage Instant Accounts For Dummies
Author Jane E. Kelly
Get to grips with Sage Instant Accounts in simple steps.This comprehensive guide walks you through every aspect of setting up and using Sage Instant Accounts, from downloading and installing the software to customizing it to your needs. Packed with handy step-by-ste....
Release Date 2014/06 -
Author Stephen Gates
Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach ha....
Release Date 2019/04 -
Introduction to Network Security, 2nd Edition
Author Zachary A. Kissel , Jie Wang
Introductory textbook in the important area of network security for undergraduate and graduate studentsComprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee securityFully updated to reflect....
Release Date 2015/10 -
Author Andy Still
Automated traffic is a major factor in the modern internet, especially for website owners. Bots, spiders, and scrapers now exceed the amount of traffic from human users, and this trend is expected to continue in the number and sophistication of bot types. With this....
Release Date 2018/04 -
Author Dimitar P. Mishev , Aliakbar Montazer Haghighi
Presents an introduction to differential equations, probability, and stochastic processes with real-world applications of queues with delay and delayed network queuesFeaturing recent advances in queueing theory and modeling, Delayed and Network Queues provides the ....
Release Date 2016/10 -
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Author Prabath Siriwardena
AdvancedAPI Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business func....
Release Date 2014/08 -
Author Andrei Miroshnikov
Go deep into Windows security tools to implement more robust protocols and processesWindows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security p....
Release Date 2018/04 -
Author Jennifer Jin , Marcus J. Carey
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
Release Date 2019/08 -
Author Suraj Gaurav , Suren Machiraju
Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NE....
Release Date 2015/06 -
Author Sairam Jetty
Discover network vulnerabilities and threats to design effective network security strategiesKey FeaturesPlunge into scanning techniques using the most popular tools Effective vulnerability assessment techniques to safeguard network infrastructure Explore the Nmap S....
Release Date 2018/09 -
Network Defense and Countermeasures: Principles and Practices, Third edition
Author Chuck Easttom
All you need to know about defending networks, in one bookClearly explains concepts, terminology, challenges, tools, and skillsCovers key security standards and models for business and governmentThe perfect introduction for all network/computer security professiona....
Release Date 2018/04 -
Author Imke Köhler
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat,....
Release Date 2019/03 -
Geopolitics and Expertise: Knowledge and Authority in European Diplomacy
Author Merje Kuus
Geopolitics and Expertise is an in-depth exploration of how expert knowledge is created and exercised in the external relations machinery of the European Union.Provides a rare, full-length work on transnational diplomatic practiceBased on a rigorous and empirical st....
Release Date 2014/03 -
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285
Author John Gay , Alex Tatistcheff , Todd Lammle
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prepSecuring Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With clear and conci....
Release Date 2015/10 -
Linux Hardening in Hostile Networks: Server Security from TLS to Tor
Author Kyle Rankin
Implement Industrial-Strength Security on Any Linux ServerIn an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-fa....
Release Date 2017/07 -
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Author Mike O'Leary
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and....
Release Date 2019/03 -
Author Stephen Bussey
Give users the real-time experience they expect, by using Elixir and Phoenix Channels to build applications that instantly react to changes and reflect the application's true state. Learn how Elixir and Phoenix make it easy and enjoyable to create real-time applications ....
Release Date 2020/03 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Routing, Flow, and Capacity Design in Communication and Computer Networks
Author Deep Medhi , Michal Pioro
In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have bee....
Release Date 2004/07 -
Author Gregory Fell , Mike Barlow
Just beneath the very busy, public Web is a shadowy realm largely untouched by search engines. This is the dark net—a hidden place where individuals and groups seek anonymity. It provides sanctuary for people living under authoritarian regimes, consumers tired of b....
Release Date 2016/07 -
Author Ajay Singh Chauhan
Get more from your network by securing its infrastructure and increasing its effectivenessAbout This BookLearn to choose the best network scanning toolset for your systemImplement different concepts of network scanning such as port scanning and OS detectionAdapt a ....
Release Date 2018/05 -
Author David Zientara
Install, Configure and Setup different connections with pfSenseKey FeaturesBuild firewall and routing solutions with PfSense. Learn how to create captive portals, how to connect Pfsense to your https environment and so on. Practical approach towards building firew....
Release Date 2018/07 -
Author Michael McLafferty , Warun Levesque , Arthur Salmon
Master the art of detecting and averting advanced network security attacks and techniquesAbout This BookDeep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and WiresharkBecome an expert in ....
Release Date 2017/04 -
Author Justin Richer Antonio Sanso
SummaryOAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client an....
Release Date 2017/03 -
Warding Off the Threat of Disruption
Author Joshua S. Gans , Daniel Cohen
In a fast-changing digital landscape, companies shouldn't wait too long to reconfigure their offerings — but they also should be wary of moving to an untested technology too soon. Monitoring trends in related industries and identifying high-potential startup....
Release Date 2016/01