Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
* Talks about hardening a Windows host before deploying Honeypot * Covers how to create your own emulated services to fool hackers * Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot * Discusses how to use Snort to co-exist with Honeypot * Discusses how to use a Unix-style Honeypot to mimic a Windows host * Discusses how to fine-tune a Honeypot * Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures
For Windows XP and Windows Server 2003 administrators preparing for Microsoft Certified Systems Engineer (MCSE) core exam 70-270, and core exams 70-297, and 70-298, this book is invaluable. Not only does it provide the resources you need to succeed on the exams, but to succeed in the real world as well. Think of this book as the notes you would have taken if you were to capture every essential nugget of information related to the skills measured in the core elective exams. To begin with, "MCSE Core Elective Exams in a Nutshell" allows you to see all of the topics expected for mastery in each of the exams. Each exam is covered in three parts: Exam Overview, Study Guide and Test Your Knowledge sections. This makes for easy reference and a great study aid. The Exams covered include: EXAM 70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional; EXAM 70-297: Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure; and EXAM 70-298: Designing Security for a Microsoft Windows Server 2003 Network. Once you have completed the exams successfully, you will find the book to be a valuable reference to core Windows administration and security skills. This book uses the same successful format found in "MCSE Core Required Exams in a Nutshell" by William Stanek, and together they satisfy all of the Core exam requirements for your MCSE certification.
"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.
|
You may like...
|