Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of about 45 related to Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs ....   

Network Intrusion Detection: An Analyst's Handbook

Stephen Northcutt, Judy Novak, Donald McLachlan - Computer networks - 2000 - 430 pages
A training aid and reference for intrusion detection analysts. The authors have been through the trenches and give you access to unusual and unique data.
Snippet view - About this book

IT Ethics Handbook:: Right and Wrong for IT Professionals

Stephen Northcutt, Cynthia Madden, Cynthia Welti - Computers - 2004 - 500 pages
The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the ...
Limited preview - About this book

Network Intrusion Detection

Stephen Northcutt, Judy Novak - Computers - 2002 - 490 pages
This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical ...
Limited preview - About this book

Network Perimeter Security: Building Defense In-Depth

Cliff Riggs - Computers - 2003 - 424 pages
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts ...
Limited preview - About this book

Guide to Firewalls and VPNs

Michael Whitman, Herbert Mattord, Andrew Green - Computers - 2011 - 368 pages
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective ...
Limited preview - About this book

Network Security First-step

Tom Thomas - Computers - 2004 - 456 pages
Provides information on the basics of computer network security, covering such topics as hackers, security policies, security technologies, firewalls, routers, VPNs, wireless ...
Limited preview - About this book

Wireless Operational Security

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP - Computers - 2004 - 468 pages
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search