Cisco Secure Intrusion Detection System
The book offers a comprehensive guide through all the perspectives of planning, deploying and maintaining Cisco Secure IDS. While the book format cannot compete with the …
Cisco Secure Virtual Private Networks
This publication is designed to give the readers basic knowledge of planning, administering and maintaining Virtual Private Networks. As it is a written reference for the …
Maximum Wireless Security
While wired networks have been around for ages and have had the time to make good security defences, wireless networks and new in comparison and still have a long way to go. …
Web Security Field Guide
This "Field guide" should be of interest to the novice and inter-mediate readers interested in enchancing the security of their Microsoft based installations. If you like to …
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …
Managing Information Security Risks: The OCTAVE Approach
This book is a powerful documentation on CERT/CC's Operationally Critical Threat, Asset, and Vulnerability Evaluation. It offers all the information you need to know while …
Firewalls and Internet Security: Repelling the Wily Hacker 2/e
The title of the book, "Firewalls and Internet Security" may point someone into believing that the book is about firewalls and their part in the Internet Security sphere. That …
Cisco Secure PIX Firewalls
The authors state that the goal of this book is help users refresh their knowledge of basic PIX operation as well as to dwell into more advanced configurations. Do they …
Network Intrusion Detection 3/e
What gives this book great value is a variety of examples we get from intrusion detection mechanisms. This is much more helpful in understanding how things work than just …
Understanding PKI: Concepts, Standards, and Deployment Considerations 2/e
If you are planning to deploy PKI inside your company, "Understanding PKI" will provide an extensive amount of information you need to understand, to see how the things work. …