Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of about 45 related to Building DMZs for enterprise networks.    

Inside network perimeter security: the definitive guide to firewalls, VPNs ...

Stephen Northcutt, Mark T. Edmead - Computers - 2003 - 678 pages
Examines how various security methods are used and how they work, covering options including packet filtering, proxy firewalls, network intrusion detection, virtual private ...
Snippet view - About this book

Case Study Research: Design and Methods

Robert K. Yin - Social Science - 2003 - 181 pages
This new edition of the best-selling Case Study Research has been carefully revised, updated, and expanded while retaining virtually all of the features and coverage of the ...
Limited preview - About this book

Instant EdgeSight for XenApp

Vaqar Hasan - Client/server computing - 2013 - 68 pages
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Instant EdgeSight for XenApp is a practical, hands-on guide ...
Limited preview - About this book

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Dafydd Stuttard, Marcus Pinto - Computers - 2008 - 736 pages
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples ...
Limited preview - About this book

Network Security First-Step

Tom Thomas - Computers - 2004 - 456 pages
Provides information on the basics of computer network security, covering such topics as hackers, security policies, security technologies, firewalls, routers, VPNs, wireless ...
Limited preview - About this book

Intranet Security: Stories from the Trenches

Linda McCarthy - Computers - 1998 - 260 pages
A guide to intranet security that shows corporate intranet managers how to learn from other's intranet security disasters. Shows how specific security beaches occurred, how ...
Snippet view - About this book

The Practice of Network Security: Deployment Strategies for Production ...

Allan Liska - Computers - 2003 - 391 pages
Covering the best practices in major security tasks including developing a security model, monitoring for and logging security breaches, and responding to an attack, this title ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search