Coverage within the book becomes increasingly complex relative to the product line.The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the ...
Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS.
Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you.
This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and ...
In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to ...
The basics of biological taxonomy are introduced, along with photographs of all major groups. Important new and controversal issues make this edition key for every primatologists, anthropologist, and anatomist.
This book provides an up-to-date account of the fabrication, mechanical properties, delamination resistance, impact tolerance and applications of 3D FRP composites.
The Hash Crack manual contains syntax and examples for the most popular cracking and analysis tools and will save you hours of research looking up tool usage.
Building on the models developed by both traditional asset pricing theorists and behavioral asset pricing theorists, this book takes the discussion to the next step.