|
Network Security Hacks: Tips & Tools for Protecting Your Privacy |
|
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Visits: 32494
Rating:
(4.0)
Rated By: 1045 Users
Added On: 26-Jul-2011
Download Network Security Hacks: Tips & Tools for Protecting Your Privacy
Category: Network Security
|
|
EBook Description: In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.
his second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.
|
Similar eBooks: eBooks related to Network Security Hacks: Tips & Tools for Protecting Your Privacy |
Firewalls VPNs Firewalls Complete
Firewalls VPNs Firewalls Complete
Open Source Security Tools Pratical Applications for Security (Tony Howlett)
Open Source Security Tools Pratical Applications for Security (Tony Howlett)
Handbook of Information Security Management (M. Krause, H. F. Tipton)
Handbook of Information Security Management (M. Krause, H. F. Tipton)
Handbook of Information Security Management (M. Krause, H. F. Tipton) Mirror
Handbook of Information Security Management (M. Krause, H. F. Tipton) Mirror
The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder)
The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder)
The Opensource PKI Book, by Symeon (Simos) Xenitellis Mirror
The Opensource PKI Book, by Symeon (Simos) Xenitellis Mirror
IT Security Cookbook (Sean Boran)
IT Security Cookbook (Sean Boran)
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID Mirror
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID Mirror
O'Reilly Security Books Chapters
O'Reilly Security Books Chapters
Network Security Hacks: Tips & Tools for Protecting Your Privacy - Free eBook Network Security Hacks: Tips & Tools for Protecting Your Privacy - Download ebook Network Security Hacks: Tips & Tools for Protecting Your Privacy free
|
|
|