Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
HANDS-ON MACHINE LEARNING WITH SCIKIT-LEARN, KERAS, AND TENSORFLOW: CONCEPTS, TOOLS, AND TECHNIQUES TO BUILD INTELLIGENT SYSTEMS, SECOND EDITION (4-COLOUR EDITION)
NRS 3960.00
 
Book details / order
NETWORK SECURITY ASSESSMENT, 2ND EDITION
How secure is your network? the best way to find out is to attack it. network security assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. with this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. network security assessment demonstrates how a determined attacker scours internet-based networks in search of vulnerable components, from the network to the application level. this new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. by grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. network security assessment helps you assess: * web services, including microsoft iis, apache, tomcat, and subsystems such as openssl, microsoft frontpage, and outlook web access (owa) * web application technologies, including asp, jsp, php, middleware, and backend databases such as mysql, oracle, and microsoft sql server * microsoft windows networking components, including rpc, netbios, and cifs services * smtp, pop3, and imap email services * ip services that provide secure inbound network access, including ipsec, microsoft pptp, and ssl vpns * unix rpc services on linux, solaris, irix, and other platforms * various types of application-level vulnerabilities that hacker tools and scripts exploit assessment is the first step any organization should take to start managing information risks correctly. with techniques to identify and assess risks in line with cesg check and nsa iam government standards, network security assessment gives you a precise method to do just that.

Author : Chris mcnab
Publication : Oreilly
Isbn : 9788184044256
Store book number : 104
NRS 720.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
HEAD FIRST KOTLIN: A BRAIN-FRIENDLY GUIDE
NRS 2600.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008