Network and system security /
Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Network security evaluation : using the NSA IEM /
Designing and building enterprise DMZs /
Information security risk management for ISO27001/ISO27002 /
Ethereal : packet sniffing /
Hack proofing your wireless network /
Web application security is a stack : how to CYA (Cover Your Apps) completely /
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Advances in cyber security : technology, operations, and experiences /
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices /
Nokia network security : solutions handbook /
CyberWar, CyberTerror, CyberCrime.
Firewall design and analysis /
Cryptography and network security.
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud /
Information security best practices : 200 basic rules /
Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Computer network /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Securing the cloud : cloud computer security techniques and tactics /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Toward a national research network /
Computer networks and communications /
Theories, Practices and Examples for Community and Social Informatics.
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
Managing Cisco network security /
PCI compliance : implementing effective PCI data security standards /
Cyber crime, security and digital intelligence /
Who goes there? : authentication through the lens of privacy /
Nessus network auditing /