FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
-
Palo Alto Firewall: Practical Guidance and Hands-On Labs
This book explains step-by-step how to configure a Palo Alto firewall in the network. Each chapter begins with learning objectives and contains step-by-step explanations for GNS3 beginners on how to build different security scenarios from scratch.
-
FortiGate Firewall: Practical Guidance and Hands-On Labs
This book explains step-by-step how to configure a FortiGate firewall in the network. Each chapter begins with learning objectives and contains step-by-step explanations for GNS3 beginners on how to build different security scenarios from scratch.
-
A Treatise on Systems (Mark Burgess)
This book serves as guide to network and system administration in the development of a new science of systems, and further illustrates practical tools for engineers at the top of their field. It describes the science behind these complex systems.
-
Nmap Network Scanning: The Official Nmap Guide
This book is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. A reference guide documents every Nmap feature and option.
-
Secrets of Network Cartography: A Comprehensive Guide to Nmap
In this book, thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis!
-
Nmap Cookbook: The Fat-Free Guide to Network Security Scanning
This book provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.
-
The Hacker's Handbook: Breaking into and Defending Networks
This book reveals the technical aspects of hacking that are least understood by network administrators by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context.
-
Kali Linux: Assuring Security by Penetration Testing
This book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing to detailed coverage.
-
Vulnerability Management for Dummies (Wolfgang Kandek)
This book is all about what you can do to automatically manage vulnerabilities and keep your network safe from attack. It arms you with the facts and shows you how to implement a successful Vulnerability Management program.
-
Cryptography and Network Security (Chandrasekhar Rao, et al)
This book introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security.
-
Analytical Network and System Administrations (Mark Burgess)
Network and system administration usually refers to the skill of keeping computers and networks running properly. This book describes the science behind these complex systems, independent of the actual operating systems they work on.
-
Applied Cryptography and Network Security (Jaydip Sen)
This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. It will be useful for professionals working in cryptography and security related areas.
-
Next-Generation Firewalls For Dummies (Palo Alto Networks)
This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.
-
Firewalls and Internet Security: Repelling the Wily Hacker
This book gives invaluable advice and practical tools for protecting our computers. Learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your easy access to Internet services.
-
Firewalls Complete (Marcus Goncalves)
This info-packed book covers virtually all firewall techniques, technologies, and brands - and even includes a blueprint for designing your own. It gives you 100% of what you need to deliver fully functional applications quickly.
-
Building Internet Firewalls, 2nd Edition (E. Zwicky, et al)
Without firewalls, network security problems can rage out of control. This book is is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall.
-
Internetworking Technology: An Engineering Perspective
This unique book provides an introduction to the key concepts relatedto front line areas of interwork specific research and development. It focuses on IPv6 and design and implememtations issues specific to the next generation internetworking using it.
-
Internetwork Technology Handbook (Cisco Systems)
This book is a comprehensive reference that enables networking professionals to understand and implement contemporary internetworking technologies. Master the terms, concepts, technologies, and devices used in today's networking industry.
-
Internetwork Troubleshooting Handbook (Cisco Systems)
This book provides the information necessary to troubleshoot many problems commonly encountered in internetworks using Cisco hardware and software products, enabling readers to diagnose and resolve specific problems common to every network type.
-
Theory and Practice of Cryptography and Network Security Protocols
This book discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges.
-
Network Security Tools: Writing, Hacking, and Modifying Security
This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.
-
Intrusion Detection Systems with Snort, Apache, MySQL, PHP, ACID
This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
-
O'Reilly® Linux Network Administrator's Guide, 2nd Edition
In this second edition of the popular book by Olaf Kirch and Terry Dawson, still sports the cowboy colophon, suggesting that netadmins have retained their Lone Ranger personas.
-
O'Reilly® Linux Network Administrator's Guide, 1st Ed (Olaf Kirch)
This book details all the tasks associated with e-mail setup and maintenance, news group setup, and essential network applications such as rcp and rlogin.
-
The Coming Swarm: DDOS Actions, Hacktivism, and Internet
This book examines the history, development, theory, and practice of Distributed Denial of Service (DDoS) actions as a tactic of political activism, with a historically grounded analysis, and a focus on early deployments of activist DDOS.
-
Juniper SRX Series: A Comprehensive Guide to Security Services
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper's SRX Series networking device.
-
Java 2 Network Security (Marco Pistoia, et al)
This book provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies.
-
O'Reilly® Snort Cookbook (Angela Orebaugh, Simon Biles, et al)
This book offers far more than quick cut-and-paste solutions to frustrating security issues using Snort, the defacto open source standard of intrusion detection tools
-
Security+ Essentials (Neil Smyth)
This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination.
-
O'Reilly® Practical UNIX and Internet Security, Second Edition
This book is a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection.
:
|
|