Security Books



Bookstore > Books > Security

Hardening Cisco Routers

Hardening Cisco Routers

by Thomas Akin

This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a...

Price:  $14.72  |  Publisher:  O'Reilly Media  |  Release:  2002

J2ME in a Nutshell

J2ME in a Nutshell

by Kim Topley

To the experienced Java developer, J2ME (the Java 2 Micro Edition) looks just familiar enough to be tempting, but just different enough to warrant caution. J2ME in a Nutshellprovides the extra security you need when venturing into programming for cell phones, PDAs and other consumer electronic devices. It gives you the reference material you need for J2ME, together with a tutorial that leverages your existi...

Price:  $4.10  |  Publisher:  O'Reilly Media  |  Release:  2002

Java Web Services

Java Web Services

by David A Chappell, Tyler Jewell

Java Web Services gives the experienced Java developer a way into the Web Services world. It helps you to understand what's going on, what the technologies mean and how they relate, and shows Java developers how to put them to use to solve real problems. You'll learn what's real and what isn't; what the technologies are really supposed to do, and how they do it. Java Web Services shows you how to use SOAP t...

Price:  $16.52  |  Publisher:  O'Reilly Media  |  Release:  2002

Essential System Administration, 3rd Edition

Essential System Administration, 3rd Edition

by AEleen Frisch

Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new...

Price:  $5.07  |  Publisher:  O'Reilly Media  |  Release:  2002

SSH, The Secure Shell

SSH, The Secure Shell

by Daniel J. Barrett, Richard E. Silverman

Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that a...

Price:  $12.98  |  Publisher:  O'Reilly Media  |  Release:  2001

Designing Large Scale Lans

Designing Large Scale Lans

by Kevin Dooley

This unique book outlines the advantages of a top-down, vendor-neutral approach to network design. Everything from network reliability, network topologies, routing and switching, wireless, virtual LANs, firewalls and gateways to security, Internet protocols, bandwidth, and multicast services are covered from the perspective of an organization's specific needs, rather than from product requirements. The book...

Price:  $3.49  |  Publisher:  O'Reilly Media  |  Release:  2001

Windows XP Unleashed

Windows XP Unleashed

by Terry William Ogletree

Windows XP Unleashed guides the advanced reader through nearly every Windows XP topic imaginable giving ideas and solutions practical to typical problems encountered by professionals.How to build network bridges between Dissimilar operating systems; Working with compatibility modes to enable older O/S to interact with XP; Performance tuning; Optimizing memory; Detailed registry info; Maximizing XP for the i...

Publisher:  SAMS Publishing  |  Release:  2001

Developing Secure Applications with Visual Basic

Developing Secure Applications with Visual Basic

by Davis Chapman

Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's under...

Price:  $8.58  |  Publisher:  SAMS Publishing  |  Release:  2000

Pages: ←Previous | 1 ... 54, 55, 56

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.