eBooks-it.org Logo
eBooks-IT.org Inner Image

Network Security eBooks Page 4

Download free Network Security eBooks Page 4

Google Hacks

Tips & Tools for Finding and Using the World's Information
Google Hacks Image
3rd Edition
Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only fin...

Apache Security

Apache Security Image
Note: This book is now out of print. A Kindle version published by the author is available from Amazon. For other digital formats (PDF, EPUB, etc), please visit feistyduck.com.With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one.To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site.Our new guide, Apache Security, give...

802.11 Security

802.11 Security Image
Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network.802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") sp...

Red Hat Linux Networking and System Administration

Red Hat Linux Networking and System Administration Image
This book is the book you need to run your business with Red Hat. It provides comprehensive coverage on how to manage and network the Red Hat Linux OS and step-by-step instructions needed to maintain and/or add to the Red Hat Linux system.This book features an entire part on security and problem solving that covers detecting intrusions/hacking, implementing local security, firewalls, and Internet security. Other topics include: RAID; TCP/IP networking; connecting to Microsoft networks; connecting to Apple networks; the Red Hat network; upgrading and customizing the kernel; using scripts; backing up and restoring the file system....

Windows 8 Step by Step

Windows 8 Step by Step Image
The smart way to learn Windows 8--one step at a time!Experience learning made easy--and quickly teach yourself how to use Windows 8. With Step by Step, you set the pace--building and practicing the skills you need, just when you need them!Set up a home network, browse the web, and use your email Use multi-touch gestures on your touch devices Manage your files with Microsoft SkyDrivePlay music and movies, and share your photos and videos Download apps and games from the Windows Store Help secure your computer and prevent common problems....



2007 - 2017 © eBooks-IT.org