jueves, 31 de enero de 2008

Teach Yourself KDE in 24 Hours


A step by step guide to using and developing KDE applications on Linux/UNIX systems, Sams Teach Yourself KDE 1.1 in 24 Hours teaches the fundamentals of KDE on various systems. Learn how to navigate the file manager and windows manager, get the most out of numerous tools and utilities, use KDE's wide base of applications, and more. This book also teaches the basics of the configuration and help systems, and shows how to use and get maximum results from the desktop environment.

Edición: SAMS (1999)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Installing and Running KDE
  2. Customizing Your KDE Settings
  3. System Administration for KDE
  4. Using Additional KDE Applications
  5. Developing for KDE

Descarga/Download

Winternals: Defragmentation, Recovery, and Administration Field Guide

The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide.

The book begins with a chapter describing the most common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. The next chapters introduce the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak which repairs unbootable or locked-out systems, restores lost data, and removes malware from infected machines. Chapters on the Administrator Pak detail all the components of this powerful suite of tools including: ERD Commander 2005, Remote Recover, NTFSDOS Professional, Crash Analyzer Wizard, FileRestore, Filemon Enterprise Edition, Regmon Enterprise Edition, AD Explorer, Insight for Active Directory, and TCP Tools. Each of these chapters details the complete functionality of all tools, and also provides detailed examples for using all tools in relatively simple to extremely complex scenarios. The chapters and companion Web site also include dozens of working scripts to automate many data recovery, backup, and performance enhancement tasks.

Edición: Syngress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Recovering Your Computer with ERD Commander
  2. Examining Your Computer
  3. Checking the Security of Your Computer
  4. Computer Monitoring
  5. Disk Management
  6. Recovering Lost Data
  7. System Troubleshooting
  8. Network Troubleshooting
  9. Tools for Programmers
  10. Working with the Source Code
  11. NT 4.0-Only Tools
  12. Having Fun with Sysinternals

Descarga/Download

Pro Apache Tomcat 6

Pro Apache Tomcat 6 is ideal for Tomcat administrators and others who want to configure Tomcat. It covers only Tomcat 6 and doesn't get bogged down trying to overexplain tasks from each older version of the server. The book examines the entire installation, including file system, database, and web server, and provides you with security and performance tips.

Edición: Apress (2007)
Idioma: Inglés
Formato: PDF



Contenido:

  1. Introducing Tomcat
  2. Installing Tomcat
  3. Examining Tomcat’s Directories
  4. Working with Tomcat’s Configuration Files
  5. Administering Web Applications
  6. Using Tomcat’s Administration Tools
  7. Configuring Tomcat
  8. Understanding Tomcat’s Class Loaders
  9. Using Tomcat’s Connectors
  10. Connecting to Databases Using JDBC
  11. Working with User Authentication
  12. Securing Tomcat
  13. Implementing Shared Tomcat Hosting
  14. Testing Tomcat’s Performance
  15. Appendix: Installing MySQL

Descarga/Download

miércoles, 30 de enero de 2008

Cisco LAN Switching Fundamentals

Cisco LAN Switching Fundamentals presents an in-depth look at modern campus network requirements. It provides an easy-to-understand introduction to LAN switching best practices using Cisco Catalyst switches. This book provides you with a wealth of details on the architecture, operation, and configuration of the Cisco Catalyst family of switches. You learn about a wide range of topics, including quality of service (QoS), multicast, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Tree (MST), private virtual LANs (VLANs), and configuration using the native and hybrid software interfaces. Design advice and configuration examples are discussed liberally throughout the book to provide you with the best perspective on effective deployment techniques. Finally, the book wraps up with a discussion of steps necessary to troubleshoot common problems and optimize LAN performance.

Edición: Cisco Press (2004)
Idioma: Inglés
Formato: CHM

Contenido:

  1. LAN Switching Foundation Technologies
  2. LAN Switch Architecture
  3. Catalyst Switching Architectures
  4. Layer 2 Fundamentals
  5. Using Catalyst Software
  6. Understanding Multilayer Switching
  7. Configuring Switches
  8. Understanding Quality of Service on Catalyst 6500
  9. Implementing Multicast on Catalyst Switches
  10. Implementing and Tuning Spanning Tree
  11. Design and Implementation Best Practices
  12. Troubleshooting the LAN Switching Configuration
  13. Appendix A: Catalyst 6500 Series Software Conversion

Descarga/Download

Hack Proofing Your E-commerce Site

The Complete Guide to Implementing a Secure E-Commerce Site.

Security in the virtual world of the Internet is even more confusing than in the real world. Vendors and free products abound, but according to experts, the Internet world is becoming more dangerous every day. How can that be? How can all these solutions from so many directions not solve even basic problems? The answer is not simple because the problems are so complex. Security is difficult to create and maintain. Security is messy.

Edición: Syngress (2001)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Applying Security Principles to Your E-Business
  2. DDoS Attacks: Intent, Tools, and Defense
  3. Secure Web Site Design
  4. Designing and Implementing Security Policies
  5. Implementing a Secure E-Commerce Web Site
  6. Securing Financial Transactions
  7. Hacking Your Own Site
  8. Disaster Recovery Planning: The Best Defense
  9. Handling Large Volumes of Network Traffic
  10. Incident Response, Forensics, and the Law
  11. Appendix A: Cisco Solutions for Content Delivery
  12. Appendix B: Hack Proofing Your E-Commerce Site Fast Track

Descarga/Download

MCDST: Microsoft Certified Desktop Support Technician Study Guide (Exams 70-271 and 70-272)

Here's the book you need to prepare for Microsoft's new MCDST exams—70-271: Supporting Users and Troubleshooting a Microsoft XP Operating System; and 70-272: Supporting Users and Troubleshooting Desktop Applications on a Microsoft Windows XP Operating System.

This two-in-one Study Guide was developed to meet the exacting requirements of today's certification candidates.

Edición: Sybex (2004)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Installing a Windows Desktop Operating System
  2. Managing and Troubleshooting Access to Resources
  3. Configuring and Troubleshooting Hardware Devices and Drivers
  4. Configuring and Troubleshooting the Desktop and User Environments
  5. Troubleshooting Network Protocols and Services
  6. Configuring and Troubleshooting Applications
  7. Resolving Usability Issues
  8. Resolving Application Customization Issues
  9. Configuring and Troubleshooting Connectivity for Applications
  10. Configuring Application Security

Descarga/Download

martes, 29 de enero de 2008

Microsoft Office Excel 2003 Bible

The most comprehensive guidebook available on the most popular spreadsheet program, fully updated to include all-new "X" features.
The definitive reference book for beginning to advanced users, featuring expert advice and hundreds of examples, tips, techniques, shortcuts, work-arounds, and more.

Edición: Wiley (2003)
Idioma: Inglés
Formato: PDF


Contenido:

  1. Getting Started with Excel
  2. Working with Formulas and Functions
  3. Creating Charts and Graphics
  4. Analyzing Data with Excel
  5. Using Advanced Excel Features
  6. Programming Excel with VBA
  7. Appendixes

Descarga/Download

Firewall Policies and VPN Configurations

This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections. Products covered include Cisco PIX Firewall, ISA Server 2004, Check Point NGX, Juniper'?s NetScreen Firewalls, SonicWall, and Nokia.

Edición: Syngress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Network Security Policy
  2. Using Your Policies to Create Firewall and VPN Configurations
  3. Defining a Firewall
  4. Deciding on a Firewall
  5. Defining a VPN
  6. Deciding on a VPN
  7. IT Infrastructure Security Plan
  8. Case Study: SOHO (Five Computers, Printer, Servers, etc.)
  9. Medium Business

Descarga/Download

Foundations of WPF: An Introduction to Windows Presentation Foundation

Foundations of WPF: An Introduction to Windows Presentation Foundation teaches you everything you need to get started with the technology, and is broken into three parts. The first introduces and contextualizes the WPF technology; the second part dives deeper into the facets of the technology that are of immediate and valuable use in developing applications; the last part offers you the real-world perspective you need to be productive in the community and customer base.

Edición: Apress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introducing WPF
  2. Programming WPF Applications
  3. Building Your First WPF Application
  4. Building a Connected WPF Application
  5. Exploring the Layout Controls
  6. Working with XAML Controls
  7. Working with Graphics and Media
  8. Working with Animation
  9. Working with 3D Graphics in WPF
  10. Distributing Your WPF Applications

Descarga/Download

domingo, 27 de enero de 2008

Cisco 802.11 Wireless Networking Quick Reference

If you work on a wireless network using Cisco® technologies, keep this book within reach. Compact and convenient, this concise reference can be browsed occasionally or consulted regularly for a glance at a technical specification or that elusive command argument. Divided into three easy-to-follow sections, Part I describes and provides ways for Cisco wireless LAN (WLAN) equipment offerings to be integrated into an existing network. Part II covers how to configure access points and clients and how to set up and manage a secure wireless network. Lastly, Part III shows you how to maintain a wireless network and troubleshoot common wireless issues. Meant to be used in a hands-on capacity, this transportable guide is a practical tool when performing a variety of tasks on your wireless network.

Edición: Cisco Press (2005)
Idioma: Inglés
Formato: CHM

Contenido:

  1. Cisco Wireless Equipment
  2. Cisco Antennas
  3. Cisco Wireless Technologies
  4. Wireless Security
  5. Installing and Configuring Access Points
  6. Configuring Clients
  7. Wireless and Wired LAN Integration Overview
  8. Wireless Security: Next Steps
  9. CiscoWorks LAN Management Solution
  10. CiscoWorks Wireless LAN Solution Engine (WLSE)
  11. Tuning AP Radio Parameters
  12. Network Tuning Tools and Resources
  13. Diagnosing Client Connection Problems
  14. Diagnosing Performance Problems
  15. Appendix A: 802.11 Protocols

Descarga/Download

viernes, 25 de enero de 2008

Troubleshooting IP Routing Protocols

Troubleshooting IP Routing Protocols offers you a full understanding of invaluable troubleshooting techniques that help keep your network operating at peak performance. Whether you are looking to hone your support skills or to prepare for the challenging CCIE exams, this essential reference shows you how to isolate and resolve common network failures and to sustain optimal network operation.



Edición: Cisco Press (2002)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Understanding IP Routing
  2. Understanding Routing Information Protocol (RIP)
  3. Troubleshooting RIP
  4. Understanding Interior Gateway Routing Protocol (IGRP)
  5. Troubleshooting IGRP
  6. Understanding Enhanced Interior Gateway Routing Protocol (EIGRP)
  7. Troubleshooting EIGRP
  8. Understanding Open Shortest Path First (OSPF)
  9. Troubleshooting OSPF
  10. Understanding Intermediate System-to-Intermediate System (IS-IS)
  11. Troubleshooting IS-IS
  12. Understanding Protocol Independent Multicast (PIM)
  13. Troubleshooting PIM
  14. Understanding Border Gateway Protocol Version 4 (BGP-4)
  15. Troubleshooting BGP

Descarga/Download

Mastering SQL Server 2005 Reporting Services Infrastructure Design

Reporting Services is a powerful tool for SQL Server 2005 database administrators, developers, and other IT professionals, enabling them to make sense of the immense amount of data generated by enterprises of all sizes.

Shows readers how to create, manage, and distribute information as well as how to design, produce, and distribute reports that meet the needs of the stakeholder.


Edición: Sybex (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Principles of a Reporting Infrastructure
  2. Determining Business Requirements
  3. Planning and Developing Role-Based Security
  4. Managing User Expectations
  5. Change Management
  6. Business Intelligence and Reporting
  7. Deploying Reporting Services
  8. Ad Hoc Reporting
  9. Subscriptions
  10. Maintenance and Administration
  11. Managing Reports Using Program Code
  12. Extending Reporting Services
  13. Report Definition Language
  14. Report Server Security
  15. Data Sources and DataSets
  16. Performance Tuning

Descarga/Download

jueves, 24 de enero de 2008

Building MPLS-Based Broadband Access VPNs

Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs. This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses.

Edición: Cisco Press (2004)
Idioma: Inglés
Formato: CHM

Contenido:

  1. Introduction: Broadband Access and Virtual Private Networks
  2. Delivering Broadband Access Today: An Access Technologies Primer
  3. VPNs in Broadband Networks
  4. Introduction to MPLS
  5. Introduction to MPLS-Based Access VPN Architectures
  6. Wholesale MPLS-VPN Related Service Features
  7. Implementing Network-Based Access VPNs Without MPLS
  8. Case Studies for Using MPLS with Broadband VPNs
  9. Future Developments in Broadband Access

Descarga/Download

InfoSecurity 2008 Threat Analysis

This book is a look at the top 10 IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. Each chapter is selected from the Syngress Security Library for its assessment of the risk, potential defenses, and disaster recovery should an intrusion occur. This book is a must have reference for any IT security professional.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Botnets: A Call to Action
  2. Botnets Overview
  3. Cross-site Scripting Fundamentals
  4. XSS Theory
  5. XSS Attack Methods
  6. Protecting Critical Infrastructure: Process Control and SCADA
  7. Final Thoughts
  8. Why PCI Is Important
  9. Protect Cardholder Data
  10. Understanding and Taking Advantage of VoIP Protocols
  11. Asterisk Hardware Ninjutsu
  12. Social Engineering

Descarga/Download

Linux+ Study Guide


Here's the book you need to prepare for CompTIA's Linux+ exam. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that has earned.


Edición: Sybex (2001)
Idioma: Inglés
Formato: PDF




Contenido:

  1. Planning the Implementation
  2. Installing Linux
  3. Software Management
  4. Users and Security
  5. Networking
  6. Managing Files and Services
  7. Managing Partitions and Processes
  8. Hardware Issues
  9. Troubleshooting

Descarga/Download

miércoles, 23 de enero de 2008

IP Quality of Service

IP Quality of Service serves as an essential resource and design guide for anyone planning to deploy QoS services in Cisco networks. Author Srinivas Vegesna provides complete coverage of Cisco IP QoS features and functions, including case studies and configuration examples. The emphasis is on real-world application-going beyond conceptual explanations to teach actual deployment.



Edición: Cisco Press (2001)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introducing IP Quality of Service
  2. Differentiated Services Architecture
  3. Network Boundary Traffic Conditioners: Packet Classifier, Marker, and Traffic Rate Management
  4. Per-Hop Behavior: Resource Allocation I
  5. Per-Hop Behavior: Resource Allocation II
  6. Per-Hop Behavior: Congestion Avoidance and Packet Drop Policy
  7. Integrated Services: RSVP
  8. Layer 2 QoS: Interworking with IP QoS
  9. QoS in MPLS-Based Networks
  10. MPLS Traffic Engineering
  11. Appendix A. Cisco Modular QoS Command-Line Interface
  12. Appendix B: Packet Switching Mechanisms
  13. Appendix C: Routing Policies
  14. Appendix D: Real-time Transport Protocol (RTP)
  15. Appendix E: General IP Line Efficiency Functions
  16. Appendix F: Link-Layer Fragmentation and Interleaving Reference
  17. Appendix G: IP Precedence and DSCP Values

Descarga/Download

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Foreword
  2. Introduction
  3. Why PCI Is Important
  4. Build & Maintain a Secure Network
  5. Protect Cardholder Data
  6. Vulnerability Management
  7. Strong Access Control
  8. Logging Access & Events
  9. Monitor & Test
  10. Monitoring Information Security Policy
  11. How to Plan a Project to Meet Compliance
  12. Leveraging PCI Compliance efforts with other Compliance Requirements
  13. Responsibilities
  14. Preparing to Fail Your First Test
  15. You're Compliant, Now What

Descarga/Download

martes, 22 de enero de 2008

Firewall Fundamentals

Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices.

Edición: Cisco Press (2006)
Idioma: Inglés
Formato: CHM

Contenido:

  1. Introduction to Firewalls
  2. Firewall Basics
  3. TCP/IP for Firewalls
  4. Personal Firewalls: Windows Firewall and Trend Micro's PC-cillin
  5. Broadband Routers and Firewalls
  6. Cisco PIX Firewall and ASA Security Appliance
  7. Linux Based Firewalls
  8. Application Proxy Firewalls
  9. Where Firewalls Fit in a Network
  10. Firewall Security Policies
  11. Managing Firewalls
  12. What Is My Firewall Telling Me?
  13. Troubleshooting Firewalls
  14. Going Beyond Basic Firewall Features
  15. Appendix A: Firewall and Security Tools
  16. Appendix B: Firewall and Security Resources

Descarga/Download

Cisco LAN Switching

Cisco LAN Switching provides the most comprehensive coverage of the best methods for designing, utilizing, and deploying LAN switching devices and technologies in a modern campus network. Divided into six parts, this book takes you beyond basic switching concepts by providing an array of proven design models, practical implementation solutions, and troubleshooting strategies.

Edición: Cisco Press (1999)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Desktop Technologies
  2. Segmenting LANs
  3. Bridging Technologies
  4. Configuring the Catalyst
  5. VLANs
  6. Understanding Spanning Tree
  7. Advanced Spanning Tree
  8. Trunking Technologies and Applications
  9. Trunking with LAN Emulation
  10. Trunking with Multiprotocol Over ATM
  11. Layer 3 Switching
  12. VLAN Trunking Protocol
  13. Multicast and Broadcast Services
  14. Campus Design Models
  15. Campus Design Implementation
  16. Troubleshooting
  17. Case Studies: Implementing Switches
  18. Layer 3 Switching and the Catalyst 6000/6500s

Descarga/Download

lunes, 21 de enero de 2008

Foundations of SQL Server 2005 Business Intelligence

Foundations of SQL Server 2005 Business Intelligence is the quickest path to understanding BI, and it is essential reading for all who work with SQL Server 2005. It explains how best to use Analysis Services, SQL Server Integration Services, SQL Server Reporting Services, and SQL Server Data Mining. It also describes best practices for implementing end-to-end BI solutions in small, medium, and large business environments. And it provides important information about integrating BI with various client tools.

Edición: Apress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. What Is Business Intelligence?
  2. OLAP Modeling
  3. Introducing SSIS
  4. Using SSAS
  5. Intermediate OLAP Modeling
  6. Advanced OLAP Modeling
  7. Cube Storage and Aggregation
  8. Intermediate SSIS
  9. Advanced SSIS
  10. Introduction to MDX
  11. Introduction to Data Mining
  12. Reporting Tools
  13. SSAS Administration
  14. Integration with Office 2007

Descarga/Download

Unix System Administration: A Beginner's Guide

Learn to administer UNIX from both a network and single system perspective with help from this introductory resource. You’ll get clear advice on everything from installation and configuration to setting up important services such as Web Server, FTP, SNMP, DNS, as well as other key functions. You’ll also find specific information for the Solaris, HP-UX, and AIX platforms.

Edición: McGraw-Hill (2002)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction to UNIX
  2. Basic UNIX Commands
  3. Using System Administration Tools
  4. Software Package Management Tools
  5. Maintaining UNIX Users
  6. File Systems, Disks, and Tools
  7. System Security
  8. Backup and Restore
  9. System Operations
  10. The TCP/IP Suite
  11. Basic Network Tools
  12. Advanced Network Tools
  13. Overview of SNMP
  14. Using the Domain Name System
  15. Using NIS
  16. SNMP System Management Tools
  17. Using Network File System
  18. File Transfer Protocol
  19. Important System Administration Tasks/Information
  20. Using DHCP
  21. Using rdist
  22. Appendix A: Answers to Mastery Checks
  23. Appendix B: Tools at a Glance
  24. Appendix C: Overview of MIB-II

Descarga/Download

Cryptography for Developers

As a software developer who is not a cryptographer by trade the most difficult and costly part of implementing a cryptographic system is knowing how to efficiently implement cryptography to solve a specific problem. Whether you are authenticating a user with a system or securing bi-directional stateless Internet traffic, you'll need to implement cryptographic components. The book's companion Web site offers a 300-page text on implementing multiple precision arithmetic.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction
  2. ASN.1 Encoding
  3. Random Number Generation
  4. Advanced Encryption Standard
  5. Hash Functions
  6. Message-Authentication Code Algorithms
  7. Encrypt and Authenticate Modes
  8. Large Integer Arithmetic
  9. Public Key Algorithms

Descarga/Download

sábado, 19 de enero de 2008

Network+ Fast Pass

Sybex, a participant member of the Network+ Advisory Committee, offers you this perfect companion to the latest edition of its best-selling Network+ Study Guide. With clear objective-by-objective coverage, this concise and economical treatment of Network+ topics is ideal for last-minute review and reinforcement of key topics.




Edición: Sybex (2005)
Idioma: Inglés
Formato: PDF


Contenido:

  1. Domain 1 Media and Topologies
  2. Domain 2 Protocols and Standards
  3. Domain 3 Network Implementation
  4. Domain 4 Network Support

Descarga/Download

Network Security Architectures

Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way.

Edición: Cisco Press (2004)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Network Security Axioms
  2. Security Policy and Operations Life Cycle
  3. Secure Networking Threats
  4. Network Security Technologies
  5. Device Hardening
  6. General Design Considerations
  7. Network Security Platform Options and Best Deployment Practices
  8. Common Application Design Considerations
  9. Identity Design Considerations
  10. IPsec VPN Design Considerations
  11. Supporting-Technology Design Considerations
  12. Designing Your Security System
  13. Edge Security Design
  14. Campus Security Design
  15. Teleworker Security Design
  16. Secure Network Management and Network Security Management
  17. Case Studies
  18. Conclusions

Descarga/Download