Nejnižší cena za posledních 60 dní: 1 785 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis,
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start
Pioneering legal advice for people with no time to
Illuminating Albers's skill as a weaver, her material awareness and acute understanding of art and design, this much-needed publication is a celebration of one of the most influential artists of the twentieth century, and her endless
Lavish, romantic and magical, The Sky Weaver is a new standalone story set in the world of The Last Namsara - one that fans of Leigh Bardugo, Holly Black and Laini Taylor will flock
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that
Master the moves of krav maga--the international self-defense and physical fitness sensationIncreasingly popular around the world, krav maga is the renowned hand-to-hand Martial Arts defense fighting designed by the Israeli military forces. Swift, powerful, and simple, it is an effective method for
The custom of formal dining at Oxford and Cambridge dates back to the earliest days of college life. Before each dinner, according to ancient statutes, grace must be said in Latin, and, although the text and nature of grace for each college has changed over the years, the tradition itself remains
The classic step-by-step guide to thesis and dissertation success, fully updated for 2018. From research to defense, a masters thesis or doctoral dissertation is a major undertaking. Since 1998, this book has been the go-to resource for scholars seeking guidance at every phase of the process
A complete guide to writing and selling your novel So you want to write a novel? Great That's a worthy goal, no matter what your reason. But don't settle for just writing a novel. Aim high. Write a novel that you intend to sell to a publisher. Writing Fiction for Dummies is a complete guide
SAE J1939 has become the accepted industry standard and the vehicle network technology of choice for off-highway machines in applications such as construction, material handling, and forestry machines. J1939 is a higher-layer protocol based on Controller Area Network (CAN). It provides serial data
Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West's completely updated NETWORK+ GUIDE TO NETWORKS, 9E. This resource thoroughly prepares you for success on the latest CompTIA's Network+