End-to-End Network Security
LTE Security
Hyper-V Security
Junos Security
Transnational Security
Microsoft Azure Security
Untangle Network Security
UMTS Security
Can you afford not to read this book?…The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and ...
Router Security Strategies: Sec ...
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separat ...
End-to-End Network Security
End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highl ...
Wireless and Mobile Networks Se ...
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with ...
WiMAX Security and Quality of S ...
WiMAX is the first standard technology to deliver true broadbandmobility at speeds that enable powerful multimedia applicationssuch as Voice over Inte ...
LTE Security
Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security su ...
Nmap 6: Network Exploration and ...
Master the basic scanning techniques for port scanning and host discovery. Perform security checks to web applications, mail servers and databases. Le ...
The Practice of Network Securit ...
Network security is not simply about building impenetrable walls â determined attackers will eventually overcome traditional defenses. The most effe ...
Advances in Security of Informa ...
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecN ...
Hyper-V Security
Keeping systems safe and secure is a new challenge for Hyper-V Administrators. As critical data and systems are transitioned from traditional hardware ...
Building the Infrastructure for ...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This boo ...
A+, Network+, Security+ Exams i ...
If you’re preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you’ll find this book invaluab ...
Junos Security
Junos Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, h ...
CCNA Security Portable Command ...
Preparing for the latest CCNA® Security exam? Here are all the CCNA Security commands you need in one condensed, portable resource. Filled with valuab ...
Network Security Through Data A ...
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security resea ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
Android Security: Attacks and D ...
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security ...
Aspect-Oriented Security Harden ...
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML langu ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
Microsoft Dynamics AX 2012 R3 S ...
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakehold ...
Microsoft Azure Security
Microsoft Azure Security helps you ensure that all your applications and services stay secure and safe from any threats. Starting with a quick tour th ...
Untangle Network Security
Untangle NG Firewall simplifies network security because of its easy configuration and user-friendly interface. These attributes, in addition to its l ...
Security Planning: An Applied A ...
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan ...
Guide to Computer Network Secur ...
This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communicatio ...