eBooks-it.org Logo
eBooks-IT.org Inner Image

Security & Encryption eBooks Page 5

Download free Security & Encryption eBooks Page 5

Red Hat Linux Networking and System Administration

Red Hat Linux Networking and System Administration Image
This book is the book you need to run your business with Red Hat. It provides comprehensive coverage on how to manage and network the Red Hat Linux OS and step-by-step instructions needed to maintain and/or add to the Red Hat Linux system.This book features an entire part on security and problem solving that covers detecting intrusions/hacking, implementing local security, firewalls, and Internet security. Other topics include: RAID; TCP/IP networking; connecting to Microsoft networks; connecting to Apple networks; the Red Hat network; upgrading and customizing the kernel; using scripts; backing up and restoring the file system....

Digital Systems Engineering

Digital Systems Engineering Image
What makes some computers slow? What makes some digital systems operate reliably for years while others fail mysteriously every few hours? Why do some systems dissipate kilowatts while others operate off batteries? These questions of speed, reliability, and power are all determined by the system-level electrical design of a digital system. Digital Systems Engineering presents a comprehensive treatment of these topics. It combines a rigorous development of the fundamental principles in each area with down-to-earth examples of circuits and methods that work in practice. The book not only can serve as an undergraduate textbook, filling the gap between circuit design and logic design, but also can help practicing digital designers keep up with the speed ...

Complexity and Cryptography

An Introduction
Complexity and Cryptography Image
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years....

Hacking Exposed VoIP

Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP Image
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed WayThis book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies. --Ron Gula, CTO of Tenable Network SecurityBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implem...

CCNP Security VPN

Official Cert Guide 642-648
CCNP Security VPN Image
2nd Edition
The official study guide helps you master all the topics on the CCNP Security VPN exam, including Configuring policies, inheritance, and attributes AnyConnect Remote Access VPN solutions AAA and Dynamic Access Policies (DAP) High availability and performance Clientless VPN solutions SSL VPN with Cisco Secure Desktop Easy VPN solutions IPsec VPN clients and site-to-site VPNs The CD-ROM contains a free, complete practice exam. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test Pearson IT Certification Practice Test minimum system requirements: Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framew...



2007 - 2017 © eBooks-IT.org