-
Security+ Practice Questions Exam Cram 2 (Exam SYO-101)
Author Hans B. Sparbel
The Security+ exam certifies that candidates have demonstrated the aptitude and ability to master general security concepts, communications security, infrastructure security, basics of cryptography, and operation/organizational security. Security+ is taught at Excel....
Release Date 2004/03 -
Author Keith Mortier , Allen Keele
Want an affordable yet innovative approach to studying for the Certified Information Systems Auditor (CISA) 2005 exam? CISA 2005 Exam Cram 2 is your solution. You will have the essential material for passing the CISA 2005 exam right at your fingertips. All exam obje....
Release Date 2005/04 -
Author Michael Gregg
A new edition of this title is available, ISBN-10: 0789738066 ISBN-13: 9780789738066Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam....
Release Date 2005/09 -
Certified Ethical Hacker Exam Prep
Author Michael Gregg
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you t....
Release Date 2006/04 -
Author Deborah E. Bouchoux
You can't touch it or feel it. Sometimes you can't even see it. Yet, intellectual property continues to soar in value, comprising an increasingly greater portion of a typical company's assets. In the age of instant global communication, understanding what intelle....
Release Date 2001/04 -
Author Roger A. Grimes
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, a....
Release Date 2001/08 -
Building Internet Firewalls, 2nd Edition
Author D. Brent Chapman , Simon Cooper , Elizabeth D. Zwicky
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their product....
Release Date 2000/06 -
Network Performance Baselining
Author Daniel Nassar
Network Performance Baselining focuses on the real world implementation of network baselining principles and shows how to measure and rate a network's performance. It includes chapters that give a real "How To" approach for standard baseline methodologies along wit....
Release Date 2000/05 -
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Author Russell Shumway , Dr. Eugene E. Schultz
This book teaches readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with a....
Release Date 2001/11 -
Designing Network Security Second Edition
Author Merike Kaeo
A practical guide to creating a secure network infrastructureUnderstand basic cryptography and security technologiesIdentify the threats and common attacks to a network infrastructureLearn how to create a security policyFind out how to recover from a security breach....
Release Date 2003/10 -
Cisco Network Design Solutions for Small-Medium Businesses
Author Peter Rybaczyk
Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.Design and implement effective network solutions by mastering the design proces....
Release Date 2004/08 -
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Author Earl Carter
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policiesReview techniques applicable to both network- and host-based platformsReview the security wheel concepts and apply security to AVVID using the SAFE BlueprintInstall and c....
Release Date 2004/02 -
CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA), Second Edition
Author Behzad Behtash
Cisco authorized self-study book for CCSP 642-521 foundation learningGain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and moreLearn the ins and outs of the PIX product family and its complete feature setUse the PIX....
Release Date 2004/01 -
CCSP Self-Study: Securing Cisco IOS Networks (SECUR)
Author John F. Roland
Cisco authorized self-study book for CCSP 642-501 foundation learningIdentify the lineup of Cisco Systems network security products and enumerate the components of a complete security policyUse Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement ....
Release Date 2004/04 -
Cisco ASA and PIX Firewall Handbook
Author Dave Huca
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security featuresLearn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall inter....
Release Date 2005/06 -
Cisco Router Firewall Security
Author Richard A. Deal
Harden perimeter routers with Cisco firewall functionality and features to ensure network securityDetect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniquesUse Network-Based Application Re....
Release Date 2004/08 -
Author Chad Sullivan
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention SystemSecure your endpoint systems with host IPSBuild and manipulate policies for the systems you wish to protectLearn how to use groups and hosts....
Release Date 2005/06 -
Penetration Testing and Network Defense
Author Daniel P. Newman , Andrew Whitaker
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plansLearn to perform social engineering and host reconnaissanceEvaluate session hijacking methodsExploit web server vulnerabilitiesDetect attempts to breach ....
Release Date 2005/10 -
Securing Your Business with Cisco ASA and PIX Firewalls
Author Greg Abelar
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occurLearn about the defense-in-depth model for deploying firewall and host protectionExamine naviga....
Release Date 2005/05 -
Author Ido Dubrawsky , Wes Noonan
The essential guide to understanding and using firewalls to protect personal computers and your networkAn easy-to-read introduction to the most commonly deployed network security deviceUnderstand the threats firewalls are designed to protect againstLearn basic firew....
Release Date 2006/06 -
Intrusion Prevention Fundamentals
Author Jonathan Hogue , Earl Carter
An introduction to network attack mitigation with IPSWhere did IPS come from? How has it evolved?How does IPS work? What components does it have?What security needs can IPS address?Does IPS work with other security products? What is the “big picture”?What are the be....
Release Date 2006/01 -
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design
Author Paul Forbes , Jason Frazier , Lou Ronnau , Denise Helfrich
Cisco Network Admission ControlVolume I: NAC Framework Architecture and DesignA guide to endpoint compliance enforcementToday, a variety of security challenges affect all businesses regardless of size and location. Companies face ongoing challenges with the fight ag....
Release Date 2006/12 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11 -
The Business Case For Network Security: Advocacy, Governance, And Roi
Author Warren Saxe , Catherine Paquet
Understand the total cost of ownership and return on investment for network security solutionsUnderstand what motivates hackers and how to classify threatsLearn how to recognize common vulnerabilities and common types of attacksExamine modern day security systems, d....
Release Date 2004/12 -
Cisco QOS Exam Certification Guide (IP Telephony Self-Study), Second Edition
Author Michael J. Cavanaugh , Wendell CCIE No. 1624 Odom
Official self-study test preparation guide for the Cisco QOS 642-642 exam. The official study guide helps you master all the topics on the QOS exam, includingQoS concepts, tools, and architecturesModular QoS CLI (MQC), QoS Policy Manager (QPM), and AutoQoSClassifica....
Release Date 2004/11 -
Home Network Security Simplified
Author Nathan Clement , Neil Anderson , Jim Doherty
A straightforward, graphic-based reference for securing your home network Set up a firewallSecure your wireless networkStop adware and spywareKeep your children safe from online threatsPrevent a virus outbreakAvoid Internet scams Phishing. Malware. Spyware. Trojan h....
Release Date 2006/07 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
Force.com: Create and Run any Application, On Demand
Author Salesforce.com
Software as a Service (SaaS), also known as on-demand computing, is changing the landscape of information technology in a profound way. By replacing locally managed stacks of networking, hardware, and software resources with an Internet-based utility, this model has....
Release Date 2007/11 -
Designing Trustworthy Organizations
Author Robert F. Hurley , Nicole Gillespie , Donald L. Ferrin , Graham Dietz
In the aftermath of the well-publicized frauds of Enron, WorldCom and Tyco circa 2001 and 2002, there were major efforts in the United States to restore trust and enforce corporate compliance. Among other things, the U.S. Congress passed the Sarbanes-Oxley Act ....
Release Date 2013/07 -
Developing the Next Generation of Enterprise Leaders
Author M. Ellen Peebles , Douglas Ready
A survey of top business executives from major international organizations found that 79% said it was extremely important to have leaders who act on behalf of the entire organization, not just their units. The rest said it was very important. Nearly 65% said they e....
Release Date 2015/10