Writing Information Security Policies

In this book security policies are covered in a way easily readable and understandable for every interested party. If you are planning on starting or enforcing the security …

A Practical Guide to Red Hat Linux 8

What you get with this massive book is a compendious guide to Red Hat Linux 8 that covers basically everything a Red Hat user might need. I can highly recommend it to both the …

Managing Cisco Network Security

This book presents all the topics covered in the instructor-led certification preparation course with the same name - Managing Cisco Network Security (MCNS). The goal of this …

Cisco Secure Intrusion Detection System

The book offers a comprehensive guide through all the perspectives of planning, deploying and maintaining Cisco Secure IDS. While the book format cannot compete with the …

Cisco Secure Virtual Private Networks

This publication is designed to give the readers basic knowledge of planning, administering and maintaining Virtual Private Networks. As it is a written reference for the …

Maximum Wireless Security

While wired networks have been around for ages and have had the time to make good security defences, wireless networks and new in comparison and still have a long way to go. …

Web Security Field Guide

This "Field guide" should be of interest to the novice and inter-mediate readers interested in enchancing the security of their Microsoft based installations. If you like to …