Wireless Security End to End
The authors truly provided an end-to-end guide that should suite both the future wireless administrators (although the book isn't so technical), as well as the members of …
Network Monitoring and Analysis: A Protocol Approach to Troubleshooting
The title of this book is very descriptive, it tells you clearly what's this book about. Network analysis and monitoring consists of employing proper software and/or hardware …
Red Hat Linux Survival Guide
Red Hat Linux is by far the most popular Linux distribution and therefore many books cover it in great detail. This time I went through a book that's not massive in size as …
The Complete Wireless Internet and Mobile Business Programming Training Course
As technology is progressing rapidly, topics like mobile business and mobile commerce receive a lot of attention. Wireless technologies allow organizations to reach new …
The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise
The examples in this book are organized very well for easy access. This is a perfect reference guide both for system administrators and home users that want to solve problems …
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks 2/e
IPSec is short for IP Security, a set of protocols developed by the Internet Engineering Task Force, is used to secure exchange of packets at the IP layer. If you're …
CCIE Security Exam Certification Guide (CCIE Self-Study)
As Cisco Systems intentionally made achieving CCIE Security certification a tough job, Cisco Press made a good choice by releasing this publication. The information compressed …
TCP/IP Bible
TCP/IP is the protocol suite that runs almost every network environment today. Consequently there are tons of books about TCP/IP - some deal with network implementation …
UNIX: Visual QuickStart Guide 2/e
There's a myriad of online documentation and books out there that can help you get into UNIX. This book is different as it concentrates on teaching using a lot of screenshots …
Deploying License-Free Wireless Wide-Area Networks
This is a very good guide aimed to the IT savvy people interested in planning and deploying broadband wireless Wide Area Networks. The publications should also be of interest …
Inside the Security Mind: Making the Tough Decisions
We are all at risk. This is the state of things and it will not change. What can change is our way of thinking about security issues and the way we approach them. Security is …
Hacking Exposed Linux 2/e
The Hacking Exposed security titles don't need any introduction. Written by the experts in the security field, they provide loads of information as seen from both perspectives …