40 products were found matching your search for Virtual Security in 4 shops:
-
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
Vendor: Abebooks.com Price: 4.46 $Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 2.29
-
ZOSI C516 2.5K 4MP Indoor Smart Plug-in Home Security Camera with 360 Pan/Tilt, Virtual Fence, 2-Way Talk, Dual Band Wifi
Vendor: Homedepot.com Price: 39.99 $ZOSI surveillance systems are designed to meet your home and business needs with easy installation and operation. Day or night, you should always feel safe and secure. With this HD security system, you can keep tabs on what's happening at your home or business and watch the high-quality video on your tablet or smartphone anytime. Color: White.
-
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
Vendor: Abebooks.com Price: 3.99 $Over 130 in Stock On 12/24/2024. Hardcover.
-
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks Doraswamy, Naganand and Harkins, Dan
Vendor: Abebooks.com Price: 34.00 $Provides extensive coverage of IPSec architecture and protocols and instruction on how to deploy IPSec in Virtual Private Networks. DLC: IPSec (Computer network protocol)
-
Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World
Vendor: Abebooks.com Price: 56.36 $In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. Cyberspace and National Security brings together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there. Policymakers and strategists will find this book to be an invaluable resource in their efforts to ensure national security and answer concerns about future cyberwarfare.
-
Securing Cloud PCs and Azure Virtual Desktop: Start implementing and optimizing security for Windows 365 and AVD infrastructure
Vendor: Abebooks.com Price: 5.81 $Unread book in perfect condition.
-
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS (Networking Technology: Security)
Vendor: Abebooks.com Price: 3.13 $Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
-
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS (Networking Technology: Security)
Vendor: Abebooks.com Price: 74.79 $Book is in NEW condition. 2.38
-
Digital Watchdog VMAX IP Plus 8-CH PoE 5MP NVR with 4 Virtual Channels & 8TB HDD
Vendor: Adorama.com Price: 1,223.99 $When seeking a sophisticated and high-tech solution for your security surveillance needs, the VMAX IP Plus 8 Channel PoE 5MP NVR stands out with its advanced features and state-of-the-art capabilities. This innovative NVR system is designed to streamline your monitoring setup, enabling you to transition from power-up to active surveillance in under three minutes. With support for high-resolution camera feeds up to 5 megapixels and a smooth 30 frames per second recording, you can rest assured that your surveillance footage will be crisp and clear.The VMAX IP Plus is not only user-friendly but also sophisticated enough to accommodate the needs of professional security setups. The Startup Wizard simplifies the configuration process, allowing for quick and efficient system setup without requiring extensive technical knowledge. In just a few minutes, you can locate and register all your cameras and initiate recording, ensuring comprehensive surveillance coverage.Enhance your monitoring capabilities with the DW Witness app, compatible with iOS and Android KitKat devices. This app transforms your smartphone or tablet into a mobile surveillance camera, providing a "black box" for personnel on patrol and ensuring that you never miss a moment of critical footage. Please note that the latest VMAX IP Plus firmware is required to utilize this feature.Security is paramount, and the VMAX IP Plus ensures your camera streams are safeguarded with CCIP System Encryption. By employing user ID and password protection on your NVR, and activating the additional CCIP encryption, your camera's RTSP stream is doubly encrypted. This ensures that the secured and encrypted RTSP stream can only be accessed by the authorized VMAX IP Plus NVR, providing an extra layer of security against unauthorized viewing.With the VMAX IP Plus, you have the power to monitor and analyze your entire system locally on the NVR. This includes keeping tabs on network status, communication, CPU usage, and overall performance. Real-time analysis of your NVR, cameras, and the complete surveillance solution is at your fingertips, ensuring that your security system operates at peak efficiency.Equipped with a generous 8TB HDD, this NVR offers ample storage space for significant amounts of high-definition footage, making it a reliable choice for those who require extensive video archiving capabilities. Whether for a retail space, corporate environment, or residential property, the VMAX IP Plus 8 Channel PoE 5MP NVR with 4 Virtual Channels is a sophisticated choice for anyone looking to enhance their security infrastructure with a professional-grade surveillance solution.
-
Inside the Java Virtual Machine (Java Masters Series)
Vendor: Abebooks.com Price: 76.38 $Discusses the origin and purpose of the Java language, platform independence, security, network mobility, and related issues, and provides detailed information and advice for programmers
-
Ipsec Virtual Private Network Fundamentals
Vendor: Abebooks.com Price: 41.59 $An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.
-
IPsec Virtual Private Network Fundamentals
Vendor: Abebooks.com Price: 88.66 $An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.
-
Conquest in Cyberspace: National Security and Information Warfare
Vendor: Abebooks.com Price: 4.27 $With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.
-
Network Security, Firewalls and Vpns Bundle. (Jones & Bartlett Learning Information Systems Security & Assurance)
Vendor: Abebooks.com Price: 31.54 $Print Textbook & Virtual Security Cloud.Please confirm the ISBNs used in your course with your instructor before placing your order; your institution may use a custom integration or an access portal that requires a different access code.Fully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, Second Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization's network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
-
Fundamentals of Information Systems Security with Cybersecurity Cloud Labs: Print Bundle (Information Systems Security & Assurance)
Vendor: Abebooks.com Price: 376.15 $Print Textbook & Virtual Security Cloud Lab Access: 180-day subscription. Please confirm the ISBNs used in your course with your instructor before placing your order; your institution may use a custom integration or an access portal that requires a different access code.
-
Fundamentals of Information Systems Security with Cybersecurity Cloud Labs: Print Bundle (Information Systems Security & Assurance)
Vendor: Abebooks.com Price: 17.63 $Print Textbook & Virtual Security Cloud Lab Access: 180-day subscription. Please confirm the ISBNs used in your course with your instructor before placing your order; your institution may use a custom integration or an access portal that requires a different access code.
-
Virtualization Security: Protecting Virtualized Environments [first edition]
Vendor: Abebooks.com Price: 34.78 $Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer. Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches Offers effective practices for securing virtual machines without creating additional operational overhead for administrators Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.
-
Bug Bounty Hunting for Web Security : Find and Exploit Vulnerabilities in Web Sites and Applications
Vendor: Abebooks.com Price: 41.28 $Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications. What You Will Learn Implement an offensive approach to bug hunting Create and manage request forgery on web pages Poison Sender Policy Framework and exploit it Defend against cross-site scripting (XSS) attacks Inject headers and test URL redirection Work with malicious files and command injectionResist strongly unintended XML attacks Who This Book Is ForWhite-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.
-
Fundamentals of Information Systems Security
Vendor: Abebooks.com Price: 55.05 $Note: This is a standalone book and does not include virtual labs access.Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. -Maps fully to the six major domains of the CompTIA Security+ SYO-401 Certification exam -Updated to include coverage on recent compliance law and standards updates, including FISMA, NIST SP800-171, and PCI DSS v3.2 -New content on advanced malware and APT attacks to the end points such as ransomware and crypto locker -Addresses data breach and data breach incident response planning -Introduces recent "Internet of Things" risk threats and privacy issues -Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more: http://www.issaseries.com/
-
Bug Bounty Hunting for Web Security : Find and Exploit Vulnerabilities in Web Sites and Applications
Vendor: Abebooks.com Price: 37.94 $Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications. What You Will Learn Implement an offensive approach to bug hunting Create and manage request forgery on web pages Poison Sender Policy Framework and exploit it Defend against cross-site scripting (XSS) attacks Inject headers and test URL redirection Work with malicious files and command injectionResist strongly unintended XML attacks Who This Book Is ForWhite-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.
40 results in 0.232 seconds
Related search terms
© Copyright 2024 shopping.eu