eBooks-it.org Logo
eBooks-IT.org Inner Image

Network Security eBooks

Download free Network Security eBooks

Configuring Juniper Networks NetScreen & SSG Firewalls

Configuring Juniper Networks NetScreen & SSG Firewalls Image
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.Configure Juniper's Instant Virtual Extranet (IVE). Install and set up IVE through either the command line interface (CLI) or Web-based console. Master the "3 Rs": Realms, Roles, and Resources.Realize the potential of the 3Rs for en...

Maximum Apache Security

Maximum Apache Security Image
Many of the high-profile attacks on prominent Web sites of the last couple years are a direct result of poor Web site or Web application security. With more than 65 percent of Web sites using the Apache Web server and the Apache-based open source Web development environment and with the risk of sabotage greater than ever Apache administrators and developers need to know how to build and maintain secure Web servers and Web applications. Yet most of the currently available Apache books lack detailed information on important Web administration topics like security. Maximum Apache Security details the complex security weaknesses and risks of Apache, and provides hands-on solutions for keeping a Web site secure and buttressed against intruders. It include...

OpenVPN

Building and Integrating Virtual Private Networks
OpenVPN Image
This book is a comprehensive guide to using OpenVPN for building both secure VPNs. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic VPN concepts, then moves to introduce basic OpenVPN configurations, before covering advanced uses of OpenVPN. This book is for both experienced and new OpenVPN users. Network administrators and any one who is interested in building secure VPNs using OpenVPN. It presumes basic knowledge of Linux, but no knowledge of VPNs is required. All basic VPN and relevant security concepts are covered....

Instant Burp Suite Starter

Instant Burp Suite Starter Image
Get up and running with Burp Suite using this hands-on practical guide Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Intercept HTTP/S requests with Burp Proxy. Tamper and analyze responses. Perform enumeration using the Burp Suite Map and Spider. Launch an automatic scan with Burp Scanner Automate attacks using Burp Intruder. In Detail Web security is more important than ever for protecting the confidentiality, integrity, and availability of web applications. Although there is no silver bullet tool, using the right instruments does play a critical role in any security initiative. Burp Suite is a well-known integrated platform for performing security testing and is considered the de-facto stan...

Designing and Implementing Linux Firewalls with QoS

Using netfilter, iproute2, NAT and L7-filter
Designing and Implementing Linux Firewalls with QoS Image
This practical guide teaches you how to implement effective network protection by using your own customized firewall solution. Based on extensive practical experience, this book distills a unique set of scenario based scripts and guidelines for a proven firewall solution, into one succinct and precise book. This book is aimed at Linux Network administrators with some understanding of Linux security threats and issues, or any one interested in securing their systems behind a firewall. Basic knowledge of Linux is presumed but other than that this book shows you how to do the rest, from configuring your system to dealing with security breaches....


2007 - 2017 © eBooks-IT.org