-
Author Thomas Akin
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco ro....
Release Date 2002/02 -
SSH, The Secure Shell: The Definitive Guide, 2nd Edition
Author Robert G. Byrnes , Richard E. Silverman , Daniel J. Barrett
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implement....
Release Date 2005/05 -
CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA), Second Edition
Author Behzad Behtash
Cisco authorized self-study book for CCSP 642-521 foundation learningGain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and moreLearn the ins and outs of the PIX product family and its complete feature setUse the PIX....
Release Date 2004/01 -
Cisco ASA and PIX Firewall Handbook
Author Dave Huca
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security featuresLearn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall inter....
Release Date 2005/06 -
Cisco Router Firewall Security
Author Richard A. Deal
Harden perimeter routers with Cisco firewall functionality and features to ensure network securityDetect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniquesUse Network-Based Application Re....
Release Date 2004/08 -
Author Chad Sullivan
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention SystemSecure your endpoint systems with host IPSBuild and manipulate policies for the systems you wish to protectLearn how to use groups and hosts....
Release Date 2005/06 -
Securing Your Business with Cisco ASA and PIX Firewalls
Author Greg Abelar
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occurLearn about the defense-in-depth model for deploying firewall and host protectionExamine naviga....
Release Date 2005/05 -
Warding Off the Threat of Disruption
Author Joshua S. Gans , Daniel Cohen
In a fast-changing digital landscape, companies shouldn't wait too long to reconfigure their offerings — but they also should be wary of moving to an untested technology too soon. Monitoring trends in related industries and identifying high-potential startup....
Release Date 2016/01 -
Principles and Practices of Interconnection Networks
Author Brian Patrick Towles , William James Dally
One of the greatest challenges faced by designers of digital systems is optimizing the communication and interconnection between system components. Interconnection networks offer an attractive and economical solution to this communication crisis and are fast b....
Release Date 2004/03 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Routing, Flow, and Capacity Design in Communication and Computer Networks
Author Deep Medhi , Michal Pioro
In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have bee....
Release Date 2004/07 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Author Andrew Ossipov , Omar Santos , Jazib Frahim
Cisco® ASAAll-in-One Next-Generation Firewall, IPS, and VPN Services, Third EditionIdentify, mitigate, and respond to today’s highly-sophisticated network attacks.Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA:....
Release Date 2014/04 -
Network Basics Companion Guide
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, f....
Release Date 2013/12 -
Linux Hardening in Hostile Networks: Server Security from TLS to Tor
Author Kyle Rankin
Implement Industrial-Strength Security on Any Linux ServerIn an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-fa....
Release Date 2017/07 -
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Author Aaron Woland , Panos Kampanakis , Omar Santos
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network securit....
Release Date 2016/06 -
Cisco Firepower Threat Defense (FTD)
Author Nazmul Rajib
The authoritative visual guide to Cisco Firepower Threat Defense (FTD)This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower....
Release Date 2017/12 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
Network Defense and Countermeasures: Principles and Practices, Third edition
Author Chuck Easttom
All you need to know about defending networks, in one bookClearly explains concepts, terminology, challenges, tools, and skillsCovers key security standards and models for business and governmentThe perfect introduction for all network/computer security professiona....
Release Date 2018/04 -
Network Security: Private Communications in a Public World, 3rd Edition
Author Charlie Kaufman , Radia Perlman , Mike Speciner , Ray Perlner
The classic guide to cryptography and network security -- now fully updated!"Alice and Bob are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explan....
Release Date 2022/09 -
A Practical Guide to Security Assessments
Author Sudhanshu Kairab
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this w....
Release Date 2004/09 -
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
Author Marco M. Morana , Tony UcedaVelez
This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security counte....
Release Date 2015/05 -
Building Expertise: Cognitive Methods for Training and Performance Improvement
Author Ruth Colvin Clark
This third edition of the classic resource, Building Expertise draws on the most recent evidence on how to build innovative forms of expertise and translates that evidence into guidelines for instructional designers, course developers and facilitators, technical com....
Release Date 2008/09 -
Geopolitics and Expertise: Knowledge and Authority in European Diplomacy
Author Merje Kuus
Geopolitics and Expertise is an in-depth exploration of how expert knowledge is created and exercised in the external relations machinery of the European Union.Provides a rare, full-length work on transnational diplomatic practiceBased on a rigorous and empirical st....
Release Date 2014/03 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Network Meta-Analysis for Decision-Making
Author Alexander J. Sutton , Jeroen P. Jansen , Nicky J. Welton , A. E. Ades , Sofia Dias
A practical guide to network meta-analysis with examples and codeIn the evaluation of healthcare, rigorous methods of quantitative assessment are necessary to establish which interventions are effective and cost-effective. Often a single study will not provide the ....
Release Date 2018/03 -
Author Elaine Marmel
Let Sage Timeslips For Dummies show you how to turn your time into moneyIf you run a business that bills for its time, it's time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips inte....
Release Date 2014/03 -
Sage Instant Accounts For Dummies
Author Jane E. Kelly
Get to grips with Sage Instant Accounts in simple steps.This comprehensive guide walks you through every aspect of setting up and using Sage Instant Accounts, from downloading and installing the software to customizing it to your needs. Packed with handy step-by-ste....
Release Date 2014/06