0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (28)
  • -
Status
Brand

Showing 1 - 25 of 30 matches in All Departments

Stealing The Network - How to Own the Box (Paperback): Syngress Stealing The Network - How to Own the Box (Paperback)
Syngress
R1,516 Discovery Miles 15 160 Ships in 12 - 17 working days

"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats," "Black Hats" and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious network intrusions

Security Assessment - Case Studies for Implementing the NSA IAM (Paperback): Syngress Security Assessment - Case Studies for Implementing the NSA IAM (Paperback)
Syngress
R2,084 Discovery Miles 20 840 Ships in 12 - 17 working days

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.
This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).
The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.
- Everything You Need to Know to Conduct a Security Audit of Your Organization
- Step-by-Step Instructions for Implementing the National Security Agency's Guidelines
- Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more

Firewall Policies and VPN Configurations (Paperback): Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh,... Firewall Policies and VPN Configurations (Paperback)
Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, …
R1,519 Discovery Miles 15 190 Ships in 12 - 17 working days

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.
This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
. The only book that focuses on creating policies that apply to multiple products.
. Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand"

Check Point Next Generation with Application Intelligence Security Administration (Paperback): Syngress Check Point Next Generation with Application Intelligence Security Administration (Paperback)
Syngress
R1,642 Discovery Miles 16 420 Ships in 12 - 17 working days

This book focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check Point NG. Like Check Point NG Security Administration, this book provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. Readers can learn how to use all of these products to create a secure network with virtual private networking features. Security professionals will buy, read, and keep this book because it will cover all features of Check Point NG FP 4 like no other book will.
- Covers all products, upgrades, and enhancements contained in FP 4 including: SMART, SecurePlatform, SecureXL, ClusterXL, and Performance Pack
- Covers all objectives on Check Point's CCSA exam, and readers will be able to download a free exam simulator from syngress.com.
- Check Point continues to dominate the Firewall space owning over 65% of the worldwide Firewall market. Syngress' book on the first version of Check Point NG continues to be the market leading Check Point book.

Configuring IPv6 For Cisco IOS (Paperback): Syngress Configuring IPv6 For Cisco IOS (Paperback)
Syngress
R1,957 Discovery Miles 19 570 Ships in 12 - 17 working days

"By building IPv6 into Cisco IOS software, we are enabling continued growth of the Internet and its expansion into new applications and capabilities in a way that maintains compatibility with existing Internet services." -- Stephen Deering, Cisco Fellow and lead designer of the protocol
Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. Two years ago, in response to the exponential increase in demand for new IP addresses, the Internet Engineering Task Force finalized its revision on IP addressing, called IP Version 6 and key hardware vendors such as Cisco and major Internet Service Providers like AOL announced plans to migrate to IP Version 6. That is now happening. Cisco Systems began incorporating Internet Protocol version 6 (IPv6) in its Cisco IOS Software in June, 2001. Cisco is currently the only major networking vendor to deliver IPv6 across multiple platforms.
This book provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network. It also covers:
Increasing the IP address size from 32 bits to 128 bits
Supporting more levels of addressing hierarchy
Supporting an increased number of addressable nodes
Supporting simpler auto-configuration of addresses
Improving the scalability of multicast routing by adding a "scope" field to multicast addresses
Use a new "anycast address" to send a packet to any one of a group of nodes

Configuring Symantec AntiVirus Enterprise Edition (Paperback, Enterprise ed): Syngress Configuring Symantec AntiVirus Enterprise Edition (Paperback, Enterprise ed)
Syngress
R1,874 Discovery Miles 18 740 Ships in 12 - 17 working days

This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.
Configuring Symantec AntiVirus Enterprise Edition contains step-by-step instructions on how to Design, implement and leverage the Symantec Suite of products in the enterprise.
OFirst book published on market leading product and fast-growing certification. Despite the popularity of Symantec's products and Symantec Product Specialist certifications, there are no other books published or announced.
OLess expensive substitute for costly on-sight training. Symantec offers week-long courses on this same product for approximately $2,500. This book covers essentially the same content at a fraction of the price, and will be an attractive alternative for network engineers and administrators.
OFree practice exam from [email protected]. Syngress will offer a free Symantec Product Specialist Certification practice exam from syngress.com. Comparable exams are priced from $39.95 to $59.95.

Developing .Net Web Services With XML (Paperback): Syngress Developing .Net Web Services With XML (Paperback)
Syngress
R1,379 Discovery Miles 13 790 Ships in 12 - 17 working days

Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability.
Developing .Net Web Services with XML introduces readers to the foundation for the .Net platform. The book covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. Readers will be given a thorough introduction to .NET and its XML building blocks while acquiring a firm grasp of how those blocks can be used to build any Web site or service so that it will federate and collaborate seamlessly with others
.Equips developers with the tool necessary to take advantage of the next generation of the internet
.This book will provide web developers with a firm understanding of XML, the building block of the .Net framework
.Includes practical, real-life applications using XML
.Unrivalled web based support: Readers can receive up-to-the minute links, white papers and analysis for two years at [email protected]."

Hack Proofing ColdFusion (Paperback): Syngress Hack Proofing ColdFusion (Paperback)
Syngress
R1,290 Discovery Miles 12 900 Ships in 12 - 17 working days

The only way to stop a hacker is to think like one
ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.
Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches.
Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.
.Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker
.Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion
.Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at [email protected]"

Checkpoint Next Generation Security Administration (Paperback): Syngress Checkpoint Next Generation Security Administration (Paperback)
Syngress
R1,788 Discovery Miles 17 880 Ships in 12 - 17 working days

Unparalleled security management that IT professionals have been waiting for.
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.
CheckPoint Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems.
CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC Research
Over 29,000 IT professionals are CheckPont Certified
This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand
Understand NGX R65 Operational Changes:
SVN Architecture, New VPN-1 Features, Additional Features, VPN-1 Power VSX
Deploy SmartClients and SmartManagement:
SmartDashboard, SmartMap, SmartView Tracker, SmartView Monitor, SmartUpdate, SmartLSM, Secure Client Packaging Tool, Management Plug-Ins, Check Point Configuration/cpconfig
Drive the Management Portal:
A Tour of the Dashboard, What s New in SmartDashboard NGX, Your First Security Policy, Other Useful Controls on the Dashboard, Managing Connectra and Interspect Gateways, Smart Portal
Master Advanced Authentication:
Authentication Overview, Users and Administrators, SmartDirectory, User Authentication, Session Authentication, Client Authentication
Use Advanced VPN Concepts for Tunnel Monitoring:
Encryption Overview, VPN Communities, Policy-Based VPN, Route-Based VPN
Configure Advanced VPN Client Installations:
SecuRemote, Secure Client, Office Mode, Visitor Mode, Windows L2TP Integration, SSL Network Extender, Backup Gateways, Multiple Entry Point VPNs
Deploy and Configure SmartDefense:
Network Security, Application Intelligence, Web Intelligence
Get Inside Secure Platform:
Installation, Configuration, Secure Platform Shell, Secure Shell
Learn Advanced Troubleshooting Techniques:
NGX Debugging, Packet Analysis, Log Troubleshooting, VPN Analysis, VPN Client Analysis, ClusterXL Troubleshooting"

Cisco Security Professional's Guide to Secure Intrusion Detection Systems (Paperback): Syngress Cisco Security Professional's Guide to Secure Intrusion Detection Systems (Paperback)
Syngress
R1,772 Discovery Miles 17 720 Ships in 12 - 17 working days

Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Professional's Guide to Secure Intrusion Detection Systems is a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion Detection Systems does more than show network engineers how to set up and manage this line of best selling products ... it walks them step by step through all the objectives of the Cisco Secure Intrusion Detection System course (and corresponding exam) that network engineers must pass on their way to achieving sought-after CCSP certification.

Hack Proofing Your Network (Paperback, 2nd edition): Syngress Hack Proofing Your Network (Paperback, 2nd edition)
Syngress
R1,533 Discovery Miles 15 330 Ships in 12 - 17 working days

A new edition the most popular Hack Proofing book around
IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:
.The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems
The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.
Updated coverage of an international bestseller and series flagship
Covers more methods of attack and hacker secrets
Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books
Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials
.A great addition to the bestselling "Hack Proofing..." series
.Windows 2000 sales have surpassed those of Windows NT
.Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp
.Unrivalled web support at [email protected]"

Cisco Security Specialists Guide to PIX Firewall (Paperback): Syngress Cisco Security Specialists Guide to PIX Firewall (Paperback)
Syngress
R1,849 Discovery Miles 18 490 Ships in 12 - 17 working days

Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
OCoverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0.
OMust-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis.
OFirewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market."

Ruby Developers Guide (Paperback): Syngress Ruby Developers Guide (Paperback)
Syngress
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

An expert guide to Ruby, a popular new Object-Oriented Programming Language
Ruby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby.
Ruby is currently experiencing a rapid rise in popularity in the object-oriented programming community
Readers receive up-to-the minute links, white papers, and analysis for two years at [email protected]
Comes with a wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular Ruby third-party programming tools and applications

Hackproofing Your Wireless Network (Paperback): Syngress Hackproofing Your Wireless Network (Paperback)
Syngress
R1,396 Discovery Miles 13 960 Ships in 12 - 17 working days

The only way to stop a hacker is to think like one
Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment.
Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.
Uses forensic-based analysis to give the reader an insight into the mind of a hacker
With the growth of wireless networks architects, engineers and administrators will need this book
Up to the minute Web based support at [email protected]

Windows 2000 Active Directory (Paperback, 2nd edition): Syngress Windows 2000 Active Directory (Paperback, 2nd edition)
Syngress
R1,564 Discovery Miles 15 640 Ships in 12 - 17 working days

Updated coverage of the most confusing Windows 2000 component in this new edition of a Syngress bestseller.
Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. Systems Engineers will probably spend much of their time over the next several years planning for and deploying Active Directory Services in many different environments. Windows 2000 Active Directory, Second Edition gives IT professionals a head start; it provides updated coverage of everything they will need to succeed.
Many Windows 2000 administrators are struggling with Active Directory and need a comprehensive book on the subject
The first completely updated book on Active Directory to hit the market

Managing Cisco Network Security (Paperback, 2nd edition): Syngress Managing Cisco Network Security (Paperback, 2nd edition)
Syngress
R1,673 Discovery Miles 16 730 Ships in 12 - 17 working days

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students
Expanded to include separate chapters on each of the security products offered by Cisco Systems

.NET Mobile Web Developers Guide (Paperback): Syngress .NET Mobile Web Developers Guide (Paperback)
Syngress
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications.
This book assumes the readers have experience in developing web applications and are familiar with any one of the server-side technologies like ASP, JSP or PHP.
The first book available on Microsoft's cornerstone wireless development tool
Best selling, high profile authors. Wei Meng Lee and Shelley Powers are frequent speakers at all of the major developer conferences have previously authored best selling books for O'Reilly & Associates, Wrox Press, SAMS and Que
Comes with wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular ASP .NET and .NET Mobile programming tools
Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for Mobile Web developers

Configuring Windows 2000 without Active Directory (Paperback): Syngress Configuring Windows 2000 without Active Directory (Paperback)
Syngress
R1,418 Discovery Miles 14 180 Ships in 12 - 17 working days

Eliminate the hassles of Active Directory - install Windows 2000 without it
Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising its impressive abilities to coordinate Internet, intranet, extranets, and management applications creating a complete technical infrastructure. However, there has been a noticeable amount of organizations that are avoiding one of the most talked about features of Windows 2000 - Active Directory. The industry buzz is that Active Directory (although a great product) is a burden to implement and install and is not compatible with non Windows products like Solaris, NetWare and Linux.
Configuring Windows 2000 WITHOUT Active Directory is a complete guide to installation and configuration of Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the new features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. The book does not cover the Active Directory function of Windows 2000.
There is nothing like this book available, yet every Windows 2000 mail list, magazine and online forum shouts for his sort of coverage

Consumers Guide to Cell Phones and Wireless Service Plans (Paperback): Syngress Consumers Guide to Cell Phones and Wireless Service Plans (Paperback)
Syngress
R624 Discovery Miles 6 240 Ships in 12 - 17 working days

Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executive
Experts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming to think of the options available to the consumer when it comes to buying mobile phones, phone accessories, and service plans. So many people are confused by the myriad of wireless phone claims, the endless advertised rates and the countless service plans with all their options. The Consumer's Guide to Cell Phones is designed to help consumers choose what program may best suit them. This book helps streamline the wireless-buying process by providing a complete listing of all wireless providers and the details of their plans.
International listings cover USA, Africa, Asia-Pacific, Australia, Europe, Latin America, and the Middle East. As an example, in Ireland there is coverage of Digiphone and other plans, in Australia of Telstra, in the UK Cellnet, Orange, etc.
The companion web site for the book includes a service provider database
As the mobile market continues to grow more people are looking to use their phone for fax, e-mail or mobile computing - this book has the answers

Designing A Wireless Network (Paperback): Syngress Designing A Wireless Network (Paperback)
Syngress
R1,305 Discovery Miles 13 050 Ships in 12 - 17 working days

Business is on the move - mobile computing must keep up
Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wireless networks. Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations.
Designing Wireless Networks provides the necessary information on how to design and implement a wireless network. Beginning with detailed descriptions of the various implementations and architectures of wireless technologies and moving to the step-by-step instructions on how to install and deploy a fixed wireless network; this book will teach users with no previous wireless networking experience how to design and build their own wireless network based on the best practices of the Enhanced Services from Lucent Technologies.
* Timely coverage of new technologies: Communication without cables is the future of netwoking
* Advocates wireless networking solutions for any user, regardless of location, device or connection.
* Written by Experts. The authors are leading WAN authorities at Lucent Technologies.
* No previous wireless experience is assumed, however, readers should have a basic understanding of networking and TCP/IP protocols

Hack Proofing Sun Solaris 8 (Paperback): Syngress Hack Proofing Sun Solaris 8 (Paperback)
Syngress
R1,642 Discovery Miles 16 420 Ships in 12 - 17 working days

The only way to stop a hacker is to think like one
Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers?
Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.
The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network
Teaches strategy and techniques using forensic-based analysis
Up to the minute Web-based support with [email protected]

Bluetooth Application Developer's Guide (Paperback): Syngress Bluetooth Application Developer's Guide (Paperback)
Syngress
R1,542 Discovery Miles 15 420 Ships in 12 - 17 working days

"Bluetooth (enabled devices) will ship in the billions of units once it gains momentum." - Martin Reynolds, Gartner Group
Bluetooth is the most exciting development in wireless computing this decade Bluetooth enabled devices can include everything from network servers, laptop computers and PDAs, to stereos and home security systems. Most Bluetooth products to hit the market in 2001 will be PC cards for laptop computers and access points, which allow up to seven Bluetooth devices to connect to a network. Reports indicate that by the end of 2003 there will be over 2 billion Bluetooth-enabled devices.
Bluetooth-enabled devices communicate with each other through embedded software applications. Bluetooth Developer's Guide to Embedded Applications will provide embedded applications developers with advanced tutorials and code listings written to the latest Bluetooth's latest specification, version 1.1. Written by Bluetooth pioneers from market leaders in Bluetooth software development, Extended Systems and Cambridge Silicon Radio, this is the first advanced level Bluetooth developer title on the market.
White Hot Topic .While other books introduce readers to the possibilities of Bluetooth, this is the first comprehensive, advanced level programming book written specifically for embedded application developers
Authors are responsible for SDK, the market-leading development tool for Bluetooth
Comes with Syngress' revolutionary Credit Card CD containing a printable HTML version of the book, all of the source code and sample applications from Extended Systems and Cambridge Silicon Radio

E-Mail Virus Protection Handbook - Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks (Paperback):... E-Mail Virus Protection Handbook - Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks (Paperback)
Syngress
R1,085 Discovery Miles 10 850 Ships in 12 - 17 working days

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented.
The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.
* Highly topical Recent events such as the LoveBug virus means the demand for security solutions has never been higher
* Focuses on specific safeguards and solutions that are readily available to users

Designing SQL Server 2000 Databases (Paperback): Syngress Designing SQL Server 2000 Databases (Paperback)
Syngress
R1,411 Discovery Miles 14 110 Ships in 12 - 17 working days

The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities of SQL Server 2000, one of the key components of .NET. SQL Server 2000 introduces powerful new data mining functionality designed specifically to capture and process customer profiles and to predict future buying patterns on e-commerce sites.
Designing SQL Server 2000 Databases for NET Enterprise Servers addresses the needs of IT professionals migrating from the popular SQL 7 databases to the new SQL 2000, as well as those who are starting from scratch.

* Covers all key features of SQL Server 2000 including; XML support, enhanced data-mining capabilities and integration with Windows 2000
* While there are many books available on SQL 7 - this is the first to be announced for SQL 2000
* Free ongoing customer support and information upgrades

Troubleshooting Windows 2000 TCP/IP (Paperback): Syngress Troubleshooting Windows 2000 TCP/IP (Paperback)
Syngress
R1,411 Discovery Miles 14 110 Ships in 12 - 17 working days

TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will learn to prevent, detect, troubleshoot and correct TCP/IP network problems. By using products such as distributed sniffers, field metering tools and protocol analyses, network managers can learn a lot about what is going on in (or wrong in) an internetwork and be able to troubleshoot a live TPC/IP network. This book focuses specifically on identifying problem areas, including identifying and correcting protocol errors, DNS route problems, application faults and slow response times.
Syngress have sold over 700,000 Microsoft and Cisco certification guides in the last two years. Most of the administrators buying these will be interested in this book.

* TPC/IP is a very popular topic; readers will welcome a guide to troubleshooting and repairing problems
* Tackles monitoring the network using protocol analyses
* Teaches effective methods of baselining and trend analysis

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
God, Where Are You?! - Finding Strength…
John Bevere Paperback R422 R355 Discovery Miles 3 550
The Four Horsemen - The Discussion That…
Richard Dawkins, Sam Harris, … Hardcover  (3)
R500 R405 Discovery Miles 4 050
Born For Greatness
Gerald J. Maarman Paperback R195 R153 Discovery Miles 1 530
Blood Brothers - To Battleground…
Deon Lamprecht Paperback  (1)
R290 R195 Discovery Miles 1 950
Handbook on Adaptive Governance
Sirkku Juhola Hardcover R4,985 Discovery Miles 49 850
State of Disaster - A Historical…
Craig E. Colten Hardcover R1,086 Discovery Miles 10 860
Environmental Transformations - A…
Mark Whitehead Paperback  (3)
R457 Discovery Miles 4 570
Triumphs of the Bible, - With the…
Henry Tullidge Paperback R591 Discovery Miles 5 910
Braai
Reuben Riffel Paperback R495 R359 Discovery Miles 3 590
Africa's Wild Dogs - A Survival Story
Jocelin Kagan Hardcover R838 R704 Discovery Miles 7 040

 

Partners