This Cisco text offers study tools for Cisco certification exam preparation, with tutorial learning of all topics for the relevant exam and self-assessment pedagogical tools. Chapters are written in modular fashion, breaking down the topics covered into easily absorbed blocks of information. View More...
Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read for anyone who owns a computer and has ever pondered the threats of modern technology. Black Hat takes a fair and thorough look at the hacking cases that have made the news in recent years. These stories include all the juicy details, like the people behind the hacking, as w... View More...
Whether retracing the steps of a security breech or tracking down high-tech crime, this computer forensics package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in court. It provides advice on how to avoid common dangers from occurring during the forensics process. View More...
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access... View More...
This title provides a guide aimed at a non-technical audience and action orientated advice for securing computer systems. Using information in this book, managers should be able to understand their company's risks to email, eCommerce, Websites, data and computer systems. View More...
With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one.To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site.Our new guide, Apache Security, gives administrators... View More...
This handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers. Kerberos provides a clear explanation of network security principles and basic concepts, while taking you through each element of the Kerberos system. Written by a network security professional who has worked with Kerberos extensively, this practical guide reveals the experience-based tips that will help you avoid pitfalls and maximize the systems capabilities. The text shows you how to obtain, install, optimize, use, an... View More...