Amazon Price: $64.99 $41.77 You save: $23.22 (36%). (as of October 15, 2019 15:42 –
Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN
The IKEv2 protocol significantly improves VPN security, and Cisco’s FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximizing compatibility with legacy VPNs. Now, two Cisco network security experts offer a complete, easy-tounderstand, and practical introduction to IKEv2, modern IPsec VPNs, and FlexVPN.
Continue reading “IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS (Networking Technology: Security)”
Amazon Price: $16.99 $16.99 (as of October 15, 2019 15:45 –
The "Missing Guide" to Windows Server Essentials. Updated November 2018.Windows Server 2016 Essentials is the popular version of Microsoft's server operating system designed for organizations with up to 25 employees. However, as with most modern applications it comes with only the most basic of instructions. Windows Server 2016 Essentials Installation Guide for Small Businesses is a succinct installation guide produced from a real world perspective and written according to the Goldilocks Principle – not too little information, not too much information, but just right. With over 190 illustrations and screenshots, practical examples and clear explanations it takes you through setting up Essentials in a typical small business. Whether you are installing Essentials for the first time, are planning to do so or are just plain curious, you will find this proven guide of interest and help. And, with everything in one place, it is the superior alternative to spending many frustrating hours searching the internet for what is sometimes inaccurate or obsolete information.1. HARDWARE AND INFRASTRUCTURE2. INSTALLATION OF WINDOWS SERVER 2016 ESSENTIALS3. USERS AND FOLDERS4. CONNECTING COMPUTERS TO THE SERVER5. BACKUPS AND RESTORES6. PRINTING7. REMOTE ACCESS8. WORKING WITH MOBILE DEVICES9. HOUSEKEEPING AND MONITORING THE HEALTH OF THE SYSTEM10. GROUP POLICY11. OFFICE 36512. MISCELLANEOUS & ADVANCED TOPICSINDEX
Amazon Price: $69.99 $50.99 You save: $19.00 (27%). (as of October 15, 2019 03:25 –
The authoritative visual guide to Cisco Firepower Threat Defense (FTD)
This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances.
Continue reading “Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation … (AMP) (Networking Technology: Security)”
Amazon Price: $59.99 $32.91 You save: $27.08 (45%). (as of October 15, 2019 11:30 –
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems students face in today's Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Students learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers. Written by well-known senior researchers at AT&T Bell Labs, Lumeta, and Johns Hopkins University the students will benefit from the actual, real-world experiences of the authors maintaining, improving, and redesigning AT&T's Internet gateway.
Amazon Price: $115.22 (as of October 14, 2019 23:20 –
The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.