
FreeComputerBooks.com
Free Computer, Mathematics, Technical Books and Lecture Notes, etc.
|
|
-
Applied Network Security (Arthur Salmon, et al)
This book is for network security professionals, cyber security professionals, and Pentesters who are well versed with fundamentals of network security and now want to master it. Deep dive into the advanced network security attacks and techniques.
-
Analytical Network and System Administrations (Mark Burgess)
Network and system administration usually refers to the skill of keeping computers and networks running properly. This book describes the science behind these complex systems, independent of the actual operating systems they work on.
-
Nmap Cookbook: The Fat-Free Guide to Network Security Scanning
This book provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.
-
Applied Cryptography and Network Security (Jaydip Sen)
This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks.
-
Kali Linux Wireless Penetration Testing Beginner's Guide
This book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing to detailed coverage.
-
Internetwork Troubleshooting Handbook (Cisco Systems)
This book provides the information necessary to troubleshoot many problems commonly encountered in internetworks using Cisco hardware and software products, enabling readers to diagnose and resolve specific problems common to every network type.
-
Theory and Practice of Cryptography and Network Security Protocols
This book discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges.
-
O'Reilly® Network Security Tools (Justin Clarke, et al)
This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.
-
O'Reilly® Linux Network Administrator's Guide, 2nd Edition
In this second edition of the popular book by Olaf Kirch and Terry Dawson, still sports the cowboy colophon, suggesting that netadmins have retained their Lone Ranger personas.
-
O'Reilly® Linux Network Administrator's Guide, 1st Ed (Olaf Kirch)
This book details all the tasks associated with e-mail setup and maintenance, news group setup, and essential network applications such as rcp and rlogin.
-
Firewalls Complete (Marcus Goncalves)
This info-packed book covers virtually all firewall techniques, technologies, and brands - and even includes a blueprint for designing your own.
-
The Coming Swarm: DDOS Actions, Hacktivism, and Internet
This book examines the history, development, theory, and practice of Distributed Denial of Service (DDoS) actions as a tactic of political activism, with a historically grounded analysis, and a focus on early deployments of activist DDOS.
-
Juniper SRX Series: A Comprehensive Guide to Security Services
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper's SRX Series networking device.
-
Secrets of Network Cartography: A Comprehensive Guide to Nmap
In this book, thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis!
-
Nmap Network Scanning: The Official Nmap Guide
This book is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing.
-
Java 2 Network Security (Marco Pistoia, et al)
This book provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies.
-
O'Reilly® Snort Cookbook (Angela Orebaugh, Simon Biles, et al)
This book offers far more than quick cut-and-paste solutions to frustrating security issues using Snort, the defacto open source standard of intrusion detection tools
-
Security+ Essentials (Neil Smyth)
This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination.
-
O'Reilly® Building Internet Firewalls, 2nd Edition (E. Zwicky, et al)
This book is is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall.
-
O'Reilly® Practical UNIX and Internet Security, Second Edition
This book is a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection.
-
Networks Security, Administration and Management
This is the previous page of Networks Security, Administration and Management, we are in the processing to convert all the books there to the new page. Please check this page later!!!
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |