Enterprise Network Testing

Learning Network Technology and Security Fundamentals [repost]  eBooks & eLearning

Posted by FenixN at Dec. 7, 2016
Learning Network Technology and Security Fundamentals [repost]

Learning Network Technology and Security Fundamentals
HDRips | MP4/AVC, ~225 kb/s | 1280x720 | Duration: 08:18:04 | English: AAC, 64 kb/s (1 ch) | 740 MB
Genre: Development / Programming / Security

In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network.

Cisco Network Security Troubleshooting Handbook [Repost]  eBooks & eLearning

Posted by tanas.olesya at June 3, 2016
Cisco Network Security Troubleshooting Handbook [Repost]

Cisco Network Security Troubleshooting Handbook by Mynul Hoda
English | Nov. 21, 2005 | ISBN: 1587051893 | 1152 Pages | CHM | 11 MB

With the myriad Cisco security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network.

Kwok T. Fung, «Network Security Technologies»  eBooks & eLearning

Posted by torbo at Oct. 8, 2006
Kwok T. Fung, «Network Security Technologies»

Kwok T. Fung, «Network Security Technologies»
Auerbach Publication | ISBN 0849330270 | PDF | 2,40 Mb | 267 Pages | 2005 Year

As the role of enterprise networks keeps expanding in its support of both internal and external connectivity in the form of emerging Internet, intranet, and extranet applications, network components are being exposed more and more seriously to malicious as well as unintentional security breaches. Network security becomes an ever increasingly critical element of enterprise network designs and implementations. A typical network security exercise involves the planning and design of a company’s networks and information technology (IT) security infrastructures so as to protect its valuable applications, sensitive data, and network resources from unauthorized access that results in either intentional or unintentional misuse and malicious alterations of the company’s assets.
Enterprise Architecture and Information Assurance: Developing a Secure Foundation (repost)

Enterprise Architecture and Information Assurance: Developing a Secure Foundation by James A. Scholz
English | 2013 | ISBN: 1439841594 | 266 pages | PDF | 4 MB
Designing Enterprise Architecture Frameworks: Integrating Business Processes with IT Infrastructure (repost)

Designing Enterprise Architecture Frameworks: Integrating Business Processes with IT Infrastructure by Liviu Gabriel Cretu
English | 2014 | ISBN: 1771880074 | 360 pages | PDF | 6 MB

Lynda - VMware vSphere: Network Troubleshooting  eBooks & eLearning

Posted by U.N.Owen at Dec. 6, 2016
Lynda - VMware vSphere: Network Troubleshooting

Lynda - VMware vSphere: Network Troubleshooting
Size: 258 MB | Duration: 2h 0m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Being able to perform basic troubleshooting techniques on a vSphere environment is a key skill for any network admin.

Penetration Testing with Raspberry Pi - Second Edition  eBooks & eLearning

Posted by Grev27 at Dec. 6, 2016
Penetration Testing with Raspberry Pi - Second Edition

Mike McPhee, Jason Beltrame, "Penetration Testing with Raspberry Pi - Second Edition"
English | ISBN: 1787126137 | 2016 | EPUB/MOBI | 248 pages | 20 MB/21 MB

Oracle Database Cloud Cookbook with Oracle Enterprise Manager 13c Cloud Control  eBooks & eLearning

Posted by Bayron at Dec. 6, 2016
Oracle Database Cloud Cookbook with Oracle Enterprise Manager 13c Cloud Control

Oracle Database Cloud Cookbook with Oracle Enterprise Manager 13c Cloud Control by Porus Homi Havewala
English | 2016 | ISBN: 0071833536 | 384 pages | EPUB | 39 MB

Learning Path: Network and Cloud Security  eBooks & eLearning

Posted by FenixN at Nov. 30, 2016
Learning Path: Network and Cloud Security

Learning Path: Network and Cloud Security
HDRips | MP4/AVC, ~270 kb/s | 1280x720 | Duration: 35 hours | English: AAC, 128 kb/s (2 ch) | 9.15 GB
Genre: Development / Programming / Secutrity

If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.

Penetration Testing with the Bash Shel  eBooks & eLearning

Posted by tanas.olesya at Nov. 27, 2016
Penetration Testing with the Bash Shel

Penetration Testing with the Bash Shell by Keith Makan
English | 26 May 2014 | ISBN: 1849695105 | 150 Pages | PDF | 3 MB

Make the most of the Bash shell and Kali Linux's command-line-based security assessment tools This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.